Back to Results
First PageMeta Content
Computer security / XTR / Key size / Group key / Diffie–Hellman key exchange / Key distribution / Security / Key management / Cyberwarfare / Key distribution center


A Scalable Method for Access Control in Location-Based Broadcast Services Mudhakar Srivatsa† , Arun Iyengar† , Jian Yin‡ and Ling Liu‡ IBM T.J. Watson Research Center† College of Computing, Georgia Tech†
Add to Reading List

Document Date: 2008-03-08 00:23:57


Open Document

File Size: 255,42 KB

Share Result on Facebook

City

Atlanta / /

Company

AES / Network Associates Inc. / TIS Labs / Related Work Group / IEEE Journal / Intel / Garmin / /

/

Facility

Ling Liu‡ IBM T.J. Watson Research Center† College of Computing / /

IndustryTerm

real-time broadcast services / cheapest gas station / Internet topology consisting / hash algorithm / file systems / hierarchical key derivation algorithms / Logical key hierarchy protocol / control using group key management protocols / update protocol / multicast routers / multicast networks / scattered / Secure group communications using key graphs / broadcast protocol / cryptographic algorithms / low latency real-time applications / computing / log2 b−a δt applications / broadcast services / proposed key management algorithms / public broadcast services / successive applications / /

MarketIndex

set 1000 / /

NaturalFeature

Yes Yes KDC-User Channel / /

OperatingSystem

Linux / DoS / /

Organization

Yin‡ and Ling Liu‡ IBM T.J. Watson Research Center† College of Computing / /

Person

Glenwood / Jian Yin / Ling Liu / Arun Iyengar / /

Position

spatial-temporal authorization model / each unit / forward / /

Product

Pentax K-x Digital Camera / /

ProgrammingLanguage

K / php / /

ProvinceOrState

Maryland / /

Technology

LAN / hash algorithm / key distribution algorithms / existing key management protocols / Linux / DoS Attacks management algorithm / api / broadcast protocol / multicast routers / key management protocols / 3.2 Multi-Dimensional Authorization Overview Key Management Algorithm / key management protocol / Xeon processors / hierarchical key derivation algorithms / Logical key hierarchy protocol / encryption / LKH protocol / proposed key management algorithms / multicast encryption / MARKS protocol / key management algorithm / ELK protocol / Caching / simulation / key update protocol / 2.2 Key Management Algorithm / key management algorithms / /

URL

http /

SocialTag