نتایج جستجو برای: key management system

تعداد نتایج: 3273501  

Journal: :CoRR 2017
Hamzeh Ghasemzadeh Ali Payandeh Mohammad Reza Aref

Security is a critical and vital task in wireless sensor networks (WSNs), therefore different key management systems have been proposed, many of which are based on symmetric cryptography. Such systems are very energy efficient, but they lack some other desirable characteristics. On the other hand, systems based on public key cryptography (PKC) have those desirable characteristics, but they cons...

2007
Jean Everson Martina Túlio Cicero Salvaro de Souza Ricardo Felipe Custódio

The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI. Relying parties need assurances that the private key used to sign their certificates is controlled and managed following pre-defined statement policy. Hardware Security Modules (HSM) offer physical and logical protection and should be considered for a...

2011
N. Suganthi

Problem statement: Key management is an important cryptographic technique for providing security in a dynamic environment of sensor networks. To provide a secure communication among a group of sensor nodes keys should established in an efficient manner. We introduced an efficient and dynamic key management system for dynamic sensor networks. Approach: We pre deployed some of the keying material...

Jamil Zargan, Keyghobad Taher Nejad, Nasrin Shaarbafchizadeh, Peivand Bastani, Razieh Alishavandi,

Background and purpose: To determine an appropriate financial model for the health system of Iran, several studies have been conducted. But it seems that these studies were not comprehensive and further investigation is required. So to design a valid and enforceable mechanism, the study of policy interventions will be considered through consensus of all stakeholders. This investigation was done...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان 1390

the changes in todays world organization, to the extent that instability can be characterized with the most stable organizations called this afternoon. if you ever change management component, an additional value to the organization was considered, today, these elements become the foundation the organization is survival. the definition of the entrepreneur to identify opportunities to exploit a...

Journal: :Int'l J. of Communications, Network and System Sciences 2012

Journal: :Вестник Алтайской академии экономики и права 2019

Journal: :Lecture Notes in Computer Science 2021

Updatable oblivious key management system (UOKMS) has been widely applied in reality to protect outsourced data confidentiality. We demonstrate that existing UOKMS fails prevent users’ private information from being leaked. show an adversary can impersonate any user access her/his sensitive UOKMS, and this problem is further exacerbated by the collusion between two entities (i.e., a server clou...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید