نتایج جستجو برای: key management system
تعداد نتایج: 3273501 فیلتر نتایج به سال:
In this article we propose content based retrieval techniques as means of improving the key management used for digital watermark monitoring. In particular, we show how keys for watermark monitoring can be used on a per media item basis (rather than one secret key for all works copyrighted by a single owner), while retaining a high probability of successful spotting.
The ample use of Wireless Sensor Network demands highly effective security mechanism for its sound operation in any hostile environment. The security of encrypted information greatly dependents on the rigidity of underlying Key Management techniques. Hence, key management becomes the most significant issue in case of security of Wireless Sensor Networks. The purpose of this paper is to assess m...
This article presents the approach followed in the United Arab Emirates (UAE) national ID scheme to register its population for the new smart ID card it launched in 2005. It presents how the organisation reengineered its operations to achieve its strategic objectives. It also presents some of the experienced challenges, and how they were dealt with. Some key management consideration areas were ...
In this paper, we review three problematic key management (KM) schemes recently proposed, including Kayam’s scheme for groups with hierarchy [10], Piao’s group KM scheme [14], Purushothama’s group KM schemes [17]. We point out the problems in each scheme. Kayam’s scheme is not secure to collusion attack. Piao’s group KM scheme is not secure. The hard problem it bases is not really hard. Purusho...
early warning systems are key components of strategies to reduce risk. this research, by adopting a systematic approach in the management of the risk of desertification and by including previously developed models and systems, offers an integrated efficient structure in terms of early warning for the risk of desertification as a pilot system for semi-arid areas of west golestan province in iran...
Wireless Sensor networks are often deployed in open environment, thus the networks can be susceptible to their unexpected physical environment and attacks from some adversaries. In addition, sensor devices are limited in resources and vulnerable to node capture, so even a few malicious adversaries can easily compromise sensor devices and inject forged data into the networks to make the networks...
Nowadays, business and recreational activities are increasingly based on the use of remote resources and e-services, and on the interaction between different, remotely located parties. In such a context, it is of paramount importance that electronic execution of private and/or sensitive transactions fully preserves information privacy, managing in a trustworthy and responsible way all identity ...
Business and Information Systems (IS) alignment is a key management issue and has been largely investigated. Yet, little research shows companies how a fit between these "two worlds" can be achieved. The assumption of this paper is that making explicit the business model can contribute to improving the business/IT alignment. Moreover information systems supporting environmental scanning, strate...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید