Parthasarathi et al., 2021 - Google Patents
Weighted ternary tree approach for secure group communication among mobile applicationsParthasarathi et al., 2021
- Document ID
- 66798867802514573
- Author
- Parthasarathi P
- Shankar S
- Publication year
- Publication venue
- Wireless Personal Communications
External Links
Snippet
Recent trends and clustered technology in the IT industries create usage of various hand- held computing devices like mobile phones, digitizer, modem, tablets etc. The Mobile phones are pervasive and inevitable computing devices used for different purposes such as …
- 238000004891 communication 0 title abstract description 53
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/06—Selective distribution or broadcast application services; Mobile application services to user groups; One-way selective calling services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liu et al. | BC-SABE: Blockchain-aided searchable attribute-based encryption for cloud-IoT | |
Zhang et al. | An efficient access control scheme with outsourcing capability and attribute update for fog computing | |
Huang et al. | Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing | |
Parthasarathi et al. | Weighted ternary tree approach for secure group communication among mobile applications | |
CN108989026B (en) | Method for revoking user attribute in publishing/subscribing environment | |
Gao et al. | BSSPD: A Blockchain‐Based Security Sharing Scheme for Personal Data with Fine‐Grained Access Control | |
Teng et al. | A Modified Advanced Encryption Standard for Data Security. | |
Li et al. | Privacy-preserving data utilization in hybrid clouds | |
Zhou et al. | Privacy enhanced data outsourcing in the cloud | |
Tu et al. | Reattack of a certificateless aggregate signature scheme with constant pairing computations | |
Meng et al. | Ciphertext-policy attribute-based encryption with hidden sensitive policy from keyword search techniques in smart city | |
Wang et al. | Efficient incremental authentication for the updated data in fog computing | |
Kumar et al. | An identity-based authentication framework for big data security | |
Zou et al. | Highly secure privacy‐preserving outsourced k‐means clustering under multiple keys in cloud computing | |
Ma et al. | A new private information encryption method in internet of things under cloud computing environment | |
Jiang et al. | Online/offline ciphertext retrieval on resource constrained devices | |
Qin et al. | An efficient key management scheme based on ECC and AVL tree for large scale wireless sensor networks | |
Wang et al. | Attribute-based equality test over encrypted data without random oracles | |
Li et al. | Secure and temporary access delegation with equality test for cloud-assisted IoV | |
Wang et al. | Multi-message and multi-receiver heterogeneous signcryption scheme for ad-hoc networks | |
Naresh et al. | A provably secure sharding based blockchain smart contract centric hierarchical group key agreement for large wireless ad‐hoc networks | |
Wei et al. | Securing fine-grained data sharing and erasure in outsourced storage systems | |
Awais et al. | A novel searchable encryption scheme to reduce the access pattern leakage | |
Yang et al. | A group key agreement protocol based on ecdh and short signature | |
Wang et al. | An efficient and provable secure revocable identity-based encryption scheme |