2012
DOI: 10.1016/j.camwa.2011.10.038
|View full text |Cite
|
Sign up to set email alerts
|

Linguistic protocols for secure information management and sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 57 publications
(28 citation statements)
references
References 5 publications
0
28
0
Order By: Relevance
“…Particularly, key renewal, which means to renew the group keys whenever members are changed, is essentially important in management of group keys. In order to deliver messages securely in multipoint communication, the existing network security requirements, such as integrity and confidentiality, are necessary, too [16,17]. In order to manage group keys securely, forward and backward secrecy must be considered to provide sercurity according to changes of members.…”
Section: Security Requirements Of Group Keys Managementmentioning
confidence: 99%
“…Particularly, key renewal, which means to renew the group keys whenever members are changed, is essentially important in management of group keys. In order to deliver messages securely in multipoint communication, the existing network security requirements, such as integrity and confidentiality, are necessary, too [16,17]. In order to manage group keys securely, forward and backward secrecy must be considered to provide sercurity according to changes of members.…”
Section: Security Requirements Of Group Keys Managementmentioning
confidence: 99%
“…For secure communication when transmitting personal information, pattern information or information access keys, it was designed to be encrypted in two or three layers in the form of cipher-chaining. This also ensured that secret keys were used in the form of chaining or a secret sharing method was used, instead of processing the information using a shared secret key [19,20]. Lastly, when information is accessed, whether the user is a legitimate user is constantly verified.…”
Section: The Process Of Accessing Pattern Informationmentioning
confidence: 99%
“…Sometimes it may be a personalized cryptography, which use some personal o biometric pattern for security purposes. Many methods of information secrecy include secret splitting techniques, secret sharing, secure information, individual human biometrics analysis [7][8][9][10][11]. The last onethe biometrics analysis include personal features, which are different for each person.…”
Section: Introductionmentioning
confidence: 99%
“…Of course we can consider for such purpose both standard as well as non-standard biometric patterns. The most important personal biometrics are following [11]:…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation