Employee Trust Based Industrial Device Deployment and Initial Key Establishment

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Employee Trust Based Industrial Device Deployment and Initial Key Establishment

An efficient key management system is required to support cryptography. Most key management systems use either pre-installed shared keys or install initial security parameters using out-of-band channels. These methods create an additional burden for engineers who manage the devices in industrial plants. Hence, device deployment in industrial plants becomes a challenging task in order to achieve...

متن کامل

Empowering Leadership, Uncertainty Avoidance, Trust, and Employee Creativity

This study was conducted in 2016 aimed to investigate the relationship between empowering leadership, uncertainty avoidance, trust, and employee creativity with regard to interaction effects and mediating mechanism. The population consists of 205 employees from the Nomadic affairs of Fars Province. In accordance with the Cochran formula, the sample size of 134 was calculated that were participa...

متن کامل

Attribute-based group key establishment

Motivated by the problem of establishing a session key among parties based on the possession of certain credentials only, we discuss a notion of attribute-based key establishment. A number of new issues arise in this setting that are not present in the usual settings of group key establishment where unique user identities are assumed to be publicly available. After detailing the security model,...

متن کامل

Employee Trust and Workplace Performance

Employee Trust and Workplace Performance We explore the relationship between employee trust of managers and workplace performance. We present a theoretical framework which serves to establish a link between employee trust and firm performance as well as to identify possible mechanisms through which the relationship may operate. We then analyse matched workplace and employee data in order to asc...

متن کامل

ID-based One-pass Authenticated Key Establishment

One-pass authenticated key establishment (AKE) protocols are arguably better suited to the ID-based environment than their two-pass counterparts. However, there is no ID-based one-pass AKE protocol proposed in the literature with a proof of security in an appropriate model. This paper addresses the current gap by proposing a new ID-based one-pass AKE protocol and proving it secure in a formal m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Network Security & Its Applications

سال: 2016

ISSN: 0975-2307,0974-9330

DOI: 10.5121/ijnsa.2016.8102