We consider systems where the keys for encrypting messages are derived from the pairwise intersections of sets of private keys issued to the users. We give improved bounds on the storage requirements of systems of this type for secure communication in a large network.
Security in network attached storage (NAS) for workgroups
β Scribed by Eve Edelson
- Publisher
- Elsevier Science
- Year
- 2004
- Tongue
- English
- Weight
- 316 KB
- Volume
- 2004
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
Sensor networks have been an attractive platform for pervasive computing and communication. However, they are vulnerable to attacks if deployed in hostile environments. The past research of sensor network security has focused on securing information in communication, but how to secure information in
The network properties of a graph ensemble subject to the constraints imposed by the expected degree sequence are studied. It is found that the linear preferential attachment is a fundamental rule, as it keeps the maximal entropy in sparse growing networks. This provides theoretical evidence in supp