نتایج جستجو برای: key management

تعداد نتایج: 1347875  

1995
Pau-Chen Cheng Juan A. Garay Amir Herzberg Hugo Krawczyk

This paper presents the design principles architec ture implementation and performance of our modu lar key management protocol MKMP and an IP se cure tunnel protocol IPST which protects the secrecy and integrity of IP datagrams using cryptographic functions To use the existing IP infrastructure MKMP is built on top of UDP and the IPST protocol is built by encapsulating IP datagrams

2014
A. Manoj kumar P. Jaya prakash

Resource limitations and potential WSNs application and key management are the challenging issues for WSNs. Network scalability is one of the important things in designing a key management scheme. So we are proposed a new scalable key management scheme for WSNs; by this we will achieve a good secure connectivity. For this purpose we used one theory that is called Unital design theory. We have t...

2004
Miodrag J. Mihaljevic Marc P. C. Fossorier Hideki Imai

Journal: :Trans. Data Privacy 2014
Mohamed Nabeel Elisa Bertino

Attribute based systems enable fine-grained access control among a group of users each identified by a set of attributes. Secure collaborative applications need such flexible attribute based systems for managing and distributing group keys. However, current group key management schemes are not well designed to manage group keys based on the attributes of the group members. In this paper, we pro...

2001
Joseph M. Firestone

This is an article about key issues in Knowledge Management (KM). It is one person's view about some of the main issues dividing practitioners about how to pursue KM, comprehend it, and eventually realize its value. I cannot, of course, cover all of the main issues here. In fact, my view of what they are may not be shared by other writers in the field. Nevertheless, I hope to cover enough of th...

2008
Ambrish Mithal Nidhi Malhotra

Osteoporosis is a disease characterized by low bone mass with micro architectural deterioration of bone tissue leading to enhance bone fragility. This increases the susceptibility to fracture. Osteoporosis is a major public health problem. Hip fractures are the most devastating consequence of osteoporosis. Osteoporosis is essentially an asymptomatic disease. Medical evaluation includes complete...

Journal: :JCS 2014
Aamir Shahzad Shahrulniza Musa Abdulaziz Aborujilah Muhammad Irfan

The SCADA system connectivity with several open networks using internet facility brought SCADA platform more vulnerable from attacks/threads. Therefore, the detail security review has been conducted, to find the potential security issues which are residing and warming the SCADA communication and also existing potential security solutions that are used to protect the SCADA communication. However...

Journal: :CoRR 2006
Sunder Lal Tej Singh

This paper presents an identity based multi-proxy multisigncryption scheme from pairings. In this scheme a proxy signcrypter group could authorized as a proxy agent by the cooperation of all members in the original signcrypter group. Then the proxy signcryption can be generated by the cooperation of all the signcrypters in the authorized proxy signcrypter group on the behalf of the original sig...

2006
Robert Dawson Colin Boyd Ed Dawson Juan Manuel González Nieto

Supervisory Control And Data Acquisition (SCADA) systems are widely used in the management of critical infrastructure such as electricity and water distrubution systems. Currently there is little understanding of how to best protect SCADA systems from malicious attacks. We review the constraints and requirements for SCADA security and propose a suitable architecture (SKMA) for secure SCADA comm...

2007
Dan Simon P. Eronen

By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she becomes aware will be disclosed, in accordance with Section 6 of BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that ot...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید