نتایج جستجو برای: key management

تعداد نتایج: 1347875  

Journal: :IEEE Trans. Communications 1993
Lein Harn Hung-Yu Lin

When a computer network grows larger and adds more services offered by different providers, each user may have to keep many keys for different services. Incorporating smart card technologies and master key concept, this letter proposes an efficient scheme to solve the key management problem in such multiservice environments.

Journal: :J. Sensors 2015
Chin-Ling Chen Tzay-Farn Shih Yu-Ting Tsai Dekui Li

2002
Gordon Greenley Graham Hooley John Saunders

There has been concern in the literature about the adequacy of the traditional model of marketing planning, which focuses on what decisions should be made and not on how to make them. The aim of this article is a new conceptualisation that proposes key management processes about how marketing planning decisions are made in a dynamic context. The motives for this conceptualisation are to contrib...

2008
Simon R. Blackburn Keith M. Martin Maura B. Paterson Douglas R. Stinson

The problem of establishing symmetric keys in wireless sensor networks has been extensively studied, but other aspects of key management have received comparatively little attention. In this paper we consider the problem of refreshing keys that are shared among several nodes in a WSN, in order to provide forward security. We discuss several applications that lead to sensor networks with very di...

2007
Attila Altay Yavuz

NOVEL METHODS FOR SECURITY PROTOCOLS AND KEY MANAGEMENT TECHNIQUES IN WIRELESS NETWORKS BASED ON SIGNCRYPTION AND HYBRID

2010
Michael Prifling

Successful software development projects depend, among other things, on their project manager’s leadership capabilities. This paper analyzes how specific leadership styles of IT project managers contributed to the success of a large IT project realized by an IT service provider in India. We conducted an interpretive case study following the principles of the Grounded Theory Methodology to explo...

2003
Issa Traore Michael Yanguo Liu

1 This report describes the first part of the evaluation of the Whitenoise cryptosystem. The second part of the evaluation is related to the evaluation of the key management facility.

2005
Bin B. Zhu Yang Yang Tierui Chen

We present a Digital Rights Management (DRM) system that supports what you see is what you pay. In our system, multimedia is compressed with a scalable codec and encrypted preserving the scalable granularity and multiaccess capability. This paper focuses on the DRM modules enabling efficient key generation and management. We employ a light license server which stores only the master keys of con...

1999
Nathalie Weiler Bernhard Plattner

Today, we face a growing interest in distributed businessto-business applications using the Internet as communication media. However, the involved security threats are often neglected in the design of such systems. In this paper, we present our security architecture for an Internet based virtual trading community. Our solution has been designed for an heterogeneous, distributed workflow managem...

2011
Sushmita Ruj Amiya Nayak Ivan Stojmenovic

Wireless networks are more vulnerable to security threats than wired networks. Since sensors are resource constrained, the use of traditional cryptographic key management techniques is not practical. Hence keys are distributed in sensor nodes prior to their deployment. This method, called key predistribution, was investigated recently in a number of studies. This chapter restricts the discussio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید