نتایج جستجو برای: key management

تعداد نتایج: 1347875  

Journal: :Future Generation Comp. Syst. 2000
Ed Dawson Andrew J. Clark Mark Looi

Despite the fact that the World Wide Web is an untrusted environment, increasing use is being made of this network (the Internet) in electronic commerce applications. To prevent attacks a strong security architecture is required. A fundamental part of such an architecture is a method for key management. This paper discusses the various components of cryptographic key management especially in re...

Journal: :IEEE Journal on Selected Areas in Communications 1999
Marcel Waldvogel Germano Caronni Dan Sun Nathalie Weiler Bernhard Plattner

Middleware supporting secure applications in a distributed environment faces several challenges. Scalable security in the context of multicasting or broadcasting is especially hard when privacy and authenticity is to be assured to highly dynamic groups where the application allows participants to join and leave at any time. Unicast security is well-known and has widely advanced into production ...

2007
Jean Everson Martina Túlio Cicero Salvaro de Souza Ricardo Felipe Custódio

The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI. Relying parties need assurances that the private key used to sign their certificates is controlled and managed following pre-defined statement policy. Hardware Security Modules (HSM) offer physical and logical protection and should be considered for a...

2011
N. Suganthi

Problem statement: Key management is an important cryptographic technique for providing security in a dynamic environment of sensor networks. To provide a secure communication among a group of sensor nodes keys should established in an efficient manner. We introduced an efficient and dynamic key management system for dynamic sensor networks. Approach: We pre deployed some of the keying material...

Despite a renewed focus in the field of global health on strengthening health systems, inadequate attention has been directed to a key ingredient of high-performing health systems: management. We aimed to develop the argument that management – defined here as the process of achieving predetermined objectives through human, financial, and technical resources – is a cross-cutting function necessa...

Journal: :Journal of Direct, Data and Digital Marketing Practice 2006

Journal: :Information Security Journal: A Global Perspective 2018

Journal: :The ANNALS of the American Academy of Political and Social Science 1919

2008

wireless connectivity and frequently changing network topology. Forming security association among a group of nodes in ad-hoc networks is more challenging than in conventional networks due to the lack of central authority, i.e. fixed infrastructure. With that view in mind, group key management plays an important building block of any secure group communication. The main contribution of this pap...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید