نتایج جستجو برای: key management
تعداد نتایج: 1347875 فیلتر نتایج به سال:
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious limitations in terms of computational power, energy supply, network bandwidth. In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques for mutual authentica...
An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...
ABSTRACS: ICT covers a broad range of fields in business and therefore makes ICT value difficult to simply define. The main factors that influence the use of ICT are therefore important to look at, as they give a good understanding of the how much influence the organisation has, on achieving value in its given context. The transformational model of ICT use was analysed to establish how SMEs in ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید