ternary tree
Recently Published Documents


TOTAL DOCUMENTS

36
(FIVE YEARS 10)

H-INDEX

5
(FIVE YEARS 2)

Author(s):  
Jianpeng Qiu ◽  
Tianling Lyu ◽  
Yang Chen ◽  
Shoujun Zhou ◽  
Liudong Xing
Keyword(s):  

2020 ◽  
Vol 30 (5) ◽  
pp. 1311-1325 ◽  
Author(s):  
Yu-Wen Huang ◽  
Chih-Wei Hsu ◽  
Ching-Yeh Chen ◽  
Tzu-Der Chuang ◽  
Shih-Ta Hsiang ◽  
...  
Keyword(s):  

2019 ◽  
Vol 8 (3) ◽  
pp. 7474-7478

Security plays essential role in any correspondence framework particularly in Group oriented correspondence. In Group oriented correspondence, entire correspondence will occur with the help of one secret key which is called Group Key. This gathering key must be changed at whatever point another part joins into the gathering just as a current part leaves from the gathering; which is known as rekeying. This gathering correspondence can be spoken to utilizing key tree. In case we utilize ternary tree, tallness of the tree will be expanded if the group members are more, so that rekeying activity takes additional time. Rather than ternary tree on the off chance that we use quad tree, so that the tree stature will be less, so that rekeying activity takes less time. So the correspondence will be increasingly secure and quicker. In this paper we are going to implement Ternary tree based Rebuild Algorithm


Sign in / Sign up

Export Citation Format

Share Document