نتایج جستجو برای: key management system
تعداد نتایج: 3273501 فیلتر نتایج به سال:
In this paper we describe the architecture and performance characteristics of a transparent, secure communication service developed for the Linux operating system. We address two key issues: performance and distributed key management. In distributed systems, conventional cryptography provides good performance at the cost of unacceptable key distribution overhead, while public key cryptography p...
This paper presents an application programmer interface (API) which, in combination with interfaces presented to a protocol stack implementation, provides a set of abstractions allowing different session key management schemes to be built outside the operating system kernel.
Various network applications require sending data onto one or many members, maintaining security in the large groups is one of the major obstacles for controlling access. Unfortunately, IP multicast is not providing any security over the group communication. Group key management is a fundamental mechanism for secured multicast. This paper presents relevant group key management protocols. Then, ...
This paper presents a new crypto scheme whose title promises it to be so boring that no-one will bother reading past the abstract. Because of this, the remainder of the paper is left blank.
The wireless sensor networking standard DASH7 operates in low-power communication with a better transmission quality in active RFID networks. The DASH7 security standard supports public key cryptography. At present, the DASH7 standard uses the message authentication code in the network layer for authentication and integrity. However, its security standard is still in an incubation stage with re...
The important of KMS could not be denied in this competitive era especially when the organization has to focus on their sustainability and to remain competitive advantage. The KMS can be considered as a pond of knowledge in the respective organization whereby the accessible of the knowledge is in the right place, right time and by the right person. The adoption of KMS could assist the organizat...
3GPP makes efforts to enable usage of 3GPP system functionalities such as SIP calls between mobile terminals and 3GPP systems via the WLAN and to utilize 3GPP system functionalities to complement the functionalities such as charging means, authentication, authorization, and accounting functions available in the WLAN. And an interworking framework to integrate the services of 3G, WLAN and WiBro ...
This article depicts the idea of service based Knowledge Management and introduces a method to design an Enterprise Knowledge Management System (E-KMS). We assume that each organisation already uses an E-KMS but only few organisations are aware of it and even less organisations design their E-KMS properly to manage their internal processes. These internal processes of an E-KMS are seen as Knowl...
This paper concentrates on analyzing and discussing the basic secure service: key management (PKey). By adding a security service layer, PKey is carefully built on the base of a routing and location layer to simple the application development. According as the layered architecture of PKey, some key protocols of PKey, which include key producing, retrieving and transferring, are designed and ana...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید