Jagadeesha et al., 2020 - Google Patents
Energy-Efficient Mobile Node in Multicast Batch VerificationJagadeesha et al., 2020
View PDF- Document ID
- 872507752015271197
- Author
- Jagadeesha R
- Thippeswamy K
- Publication year
- Publication venue
- SN Computer Science
External Links
Snippet
Conventional methods used in batch signature verification do not distinguish between static node signature verification and mobile node signature verification. Static nodes rarely face energy expenditure problem, but energy conservation is given a critical importance in …
- 230000005540 biological transmission 0 abstract description 22
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
- H04L69/322—Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L29/00—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
- H04L29/02—Communication control; Communication processing contains provisionally no documents
- H04L29/06—Communication control; Communication processing contains provisionally no documents characterised by a protocol
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/56—Packet switching systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations contains provisionally no documents
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic regulation in packet switching networks
- H04L47/10—Flow control or congestion control
- H04L47/19—Flow control or congestion control at layers above network layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/28—Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/32—Network-specific arrangements or communication protocols supporting networked applications for scheduling or organising the servicing of application requests, e.g. requests for application data transmissions involving the analysis and optimisation of the required network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8103247B2 (en) | Automated secure pairing for wireless devices | |
Jacobson et al. | Networking named content | |
US20080104170A1 (en) | Collaborative Networks for Parallel Downloads of Content | |
Xu et al. | Game theoretical secure caching scheme in multihoming edge computing-enabled heterogeneous networks | |
CN1550088A (en) | Parallel information transmission method and system based on peer-to-peer distributed computing technology | |
Moiseenko et al. | Consumer/producer communication with application level framing in named data networking | |
Kim et al. | A case for smartnic-accelerated private communication | |
Pallickara et al. | A framework for secure end-to-end delivery of messages in publish/subscribe systems | |
He et al. | Fair peer-to-peer content delivery via blockchain | |
Liu et al. | Social-aware computing based congestion control in delay tolerant networks | |
CN116684468B (en) | Data processing method, device, equipment and storage medium | |
Pagar et al. | Load balancing of fog computing centre and its security using elliptic curve cryptography | |
US7430607B2 (en) | Source throttling using CPU stamping | |
Hurali et al. | Application areas of information-centric networking: State-of-the-art and challenges | |
Dimitriou et al. | SuperTrust: a secure and efficient framework for handling trust in super-peer networks | |
Jagadeesha et al. | Energy-Efficient Mobile Node in Multicast Batch Verification | |
Palacios et al. | MioStream: a peer-to-peer distributed live media streaming on the edge | |
Ambrosin et al. | SCIoT: A secure and scalable end-to-end management framework for IoT devices | |
Kodada et al. | Protection against DDoS and data modification attack in computational grid cluster environment | |
Pallickara et al. | A security framework for distributed brokering systems | |
Asadzadeh Kaljahi et al. | TSSL: improving SSL/TLS protocol by trust model | |
Muñoz-Tapia et al. | CPC-OCSP: an adaptation of OCSP for m-Commerce | |
Zhang et al. | Implementing DRM over peer-to-peer networks with broadcast encryption | |
Chattopadhyay et al. | A Scalable, Lightweight and Secure IoT Device Connector Service Using MQTT and ECC | |
Liu et al. | Non-interactive Zero Knowledge Proof Based Access Control in Information-Centric Internet of Things |