A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Anitha, D.
- A Survey of Secure Group Key Management
Authors
1 Sri Ramakrishna College of Arts and Science for Women, Coimbatore, Tamil Nadu, IN
2 Department is with the Sri Ramakrishna College of Arts and Science for Women, Coimbatore, Tamil Nadu, IN
Source
Networking and Communication Engineering, Vol 1, No 7 (2009), Pagination: 422-429Abstract
Group key management is an important functional building block for any secure multicast architecture. Many grouporiented and distributed applications need security services which includes key management. Such applications need a secure group key to communicate their data. This brings importance to key distribution techniques. Secure group communication has applications in multimedia conferencing, stock quote distribution shared work space,distributed interactive simulation, grid computing, teleconferences, pay-per-view, multi party games etc., some of these applications engage in one to many communications while others involve many to many communications. Several protocols have been proposed to support secure group key management. This paper focuses on several protocols that are designed for secure group key management. Various protocols are discussed on focusing the key management.
Keywords
Group Key Management, Security, Secure Group Communication, Multicast.- A Study on Data Analysis for Intrusion Detection
Authors
1 Department of Computer Science, Sri Ramakrishna College of Arts and Science for Women, Coimbatore, IN
Source
Networking and Communication Engineering, Vol 9, No 1 (2017), Pagination: 13-15Abstract
Discovering hidden value in your data warehouse. Data mining, the extraction of hidden predictive information from large databases, is a powerful…
There is a huge amount of data available in the Information Industry. This data is of no use until it is converted into useful information. It is necessary to analyze this huge amount of data and extract useful information from it.Extraction of information is not the only process we need to perform; data mining also involves other processes such as Data Cleaning, Data Integration, Data Transformation, Data Mining, Pattern Evaluation and Data Presentation. Once all these processes are over, we would be able to use this information in many applications such as Fraud Detection, Market Analysis, Production Control, Science Exploration, etc.