نتایج جستجو برای: key management

تعداد نتایج: 1347875  

2010
Ali M. Al-Khouri

This article presents the approach followed in the United Arab Emirates (UAE) national ID scheme to register its population for the new smart ID card it launched in 2005. It presents how the organisation reengineered its operations to achieve its strategic objectives. It also presents some of the experienced challenges, and how they were dealt with. Some key management consideration areas were ...

2017
Mohammad-Mehdi Gilanian-Sadeghi Borhanuddin Mohd Ali Jamalul-Lail Ab Manan

Journal: :IACR Cryptology ePrint Archive 2013
Niu Liu Shaohua Tang Lingling Xu

In this paper, we review three problematic key management (KM) schemes recently proposed, including Kayam’s scheme for groups with hierarchy [10], Piao’s group KM scheme [14], Purushothama’s group KM schemes [17]. We point out the problems in each scheme. Kayam’s scheme is not secure to collusion attack. Piao’s group KM scheme is not secure. The hard problem it bases is not really hard. Purusho...

2006
Aziz Mohaisen DaeHun Nyang

Wireless Sensor Network (WSN) consists of huge number of sensor nodes which are small and inexpensive with very limited resources. The public key cryptography is undesirable to be used in WSN because of the limitations of the resources. A key management and predistribution techniques are required to apply the symmetric key cryptography in such a big network. Many key predistribution techniques ...

Journal: :مدیریت فرهنگ سازمانی 0
ابراهیم جواهری زاده دانشجوی دکتری، مدیریت بازرگانی، دانشگاه علامه طباطبایی سید محمد مقیمی استاد دانشکدة مدیریت، دانشگاه تهران آرین قلی پور استاد دانشکدة مدیریت، دانشگاه تهران رضا طهماسبی استادیار دانشکدة مدیریت و حسابداری، پردیس فارابی دانشگاه تهران

nowadays, it is belived that human resource is competitve advantage so it’s a kind of organizition capital, and therefore focusing the valuable role of individuals in organization and their desirable management is very important and sensitive. talent managenent repersents a paradigm shift in traditional human resource managenent to new human resource management that includes attention to organi...

Journal: :مدیریت آب و آبیاری 0
احمد حیدریان استادیار پژوهش، پژوهشکده حفاظت خاک و آبخیزداری، تهران - ایران

irrigation management transfer (imt) is under implementation within 63 countries over the world. the results and constraints of this event have been different in mentioned countries. this research objected to survey of imt constraints and identifies its key indicators in ghazvin and moghan pilots with different characteristics in type of irrigation and their imt process. the research method is ...

2012
Dušan Kozic Benjamin Zwittnig Janez Sterle Andrej Kos

The DNS security extensions, DNSSEC, were standardized in 2005. Since the 2008 update, they have become available for general use. The implementation of the DNSSEC is a complex task, demanding software and hardware modifications throughout the entire DNS hierarchy. That is the reason why DNSSEC has only recently received more attention. The paper presents and compares current possibilities for ...

Journal: :ACM Transactions on Information and System Security 2000

Journal: :Journal of Information Security 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید