In this paper, we present two new centralized group key management protocols based on the Chinese Remainder Theorem (CRT). By shifting more computing load onto the key server we optimize the number of re-key broadcast messages, user-side key computation, and number of key storages. The first protocol is the base Chinese Remaindering Group Key (CRGK) protocol, which with a group of n users requires the key server to do O(n) XORs, additions, multiplications, and Extended Euclidean Algorithm computations and broadcast 1 re-key message; each individual user is required to do only 1 modulo arithmetic and 1 XOR operation for each group key update. The second protocol is the Fast Chinese Remaindering Group Key (FCRGK) protocol, which only requires the key server to do O(n) XORs, additions, and multiplications most of the times with no change to the number of re-key messages and user computation per group key update. For both protocols each user only needs to store 2 keys all the time. One special attraction for our FCRGK protocol is that it allows most of the re-keying computation to be done preemptively, which means when a user-join or user-leave event happens the response time for the key server to send out the new group key can be very short.
The theoretical basis for studying the phenomenon of Global Software Development (GSD) draws upon one of the key research streams, that is, the Organizational Behavior (OB) research. The focus of this study has led to two research problems: partnership quality and service climate aspects are addressed which have given an insight into the OB research on GSD teams. Moreover, this study classifies results from the partnership quality and service climate aspects into one integrated framework, which covers 18 attributes to explore the GSD outcome factors perceived by GSD teams in OB research phenomenon. To evaluate partnership quality and team service climate aspects with reference to the GSD project outcome, we have integrated the fuzzy Decision-Making Trial and Evaluation Laboratory Model (DEMATEL) and the Technique for Order Performance by Similarity to Ideal Solution (TOPSIS) approach, which is more appropriate to find the significance of criteria. The empirical application of this hybrid approach for evaluating GSD project outcome factors has been tested in Indian software organizations. Consequently, the results of this study provide a vivid picture and facilitate the organization to reveal the importance of OB research on GSD teams.
Effectively adding security measures to a multicast service is an intriguing problem, especially when the service isdeployed in a wireless setting. Next generation IEEE 802.16standard WirelessMAN networks are a perfect example of this problem, and the latest draft specification of the standard includes a secure protocol solution called Multicast and Broadcast Rekeying Algorithm (MBRA). In this paper, we expose the security problems of MBRA, including non-scalability and omission of backward and forward secrecy, and propose new approaches, ELAPSE and ELAPSE+, to address these problems. In particular, ELAPSE+ makes use of membership and mobility information gathered in the application layer to augment the adaptive group management in the MAC layer. We analyze the security property of ELAPSE and ELAPSE+, and compare their performances with MBRA by simulating group rekeying scenarios.
The offshore/onsite teams' effectiveness of knowledge transfer is significantly measured by a various kinds of factors. In this paper, we propose a Knowledge Transfer (KT) assessment framework which is integrates four criterions: knowledge, team, technology, and organization factors to evaluate KT effectiveness of GSD teams. In this context, we presents fuzzy DEMATEL approach for assessing GSD teams KT effectiveness based on intuitionistic fuzzy numbers (IFNs). In this approach, decision makers provided their subjective judgments on the criteria, characterized on the basis of intuitionistic fuzzy sets. Moreover, intuitionistic fuzzy sets are used in the fuzzy DEMATEL approach can be effectively assessing the KT effectiveness criteria, rank the alternatives. Subsequently, the complete process is illustrated with GSD teams' KT evaluation criteria samples, the factors are ranked using fuzzy linguistic variables which are mapped to IFNs. In that case, IFNs has been converted into their corresponding basic probability assignments (BPAs) and then Dempster-Shafer theory is used to combine the group decision making process. Besides, illustrate applicability and usefulness of proposed approach in group decision making process for evaluation of multiple criteria's under fuzzy environment has been tested by software professionals at Inowits software organization in India.
Abstract-In this paper, we first identify a vulnerability of IEEE 802.11 wireless LANs in which a compromised access point can still authenticate itself to a wireless station and gain control over the connection, and show that the current IEEE 802.11i standard does not address this problem. We then propose a new protocol that can counter this attack by providing dual authentication for both a wireless station and its corresponding access point at connection setup time using the authentication server. We also consider roaming situations and present a roaming authentication protocol. Finally, we show that our protocol is in conformance with the requirements of the IEEE 802.11i standard, and show that it performs no worse with respect to communication time than IEEE 802.11i using a prototype implementation of each protocol.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.