Employee Trust Based Industrial Device Deployment and Initial Key Establishment
نویسندگان
چکیده
منابع مشابه
Employee Trust Based Industrial Device Deployment and Initial Key Establishment
An efficient key management system is required to support cryptography. Most key management systems use either pre-installed shared keys or install initial security parameters using out-of-band channels. These methods create an additional burden for engineers who manage the devices in industrial plants. Hence, device deployment in industrial plants becomes a challenging task in order to achieve...
متن کاملEmpowering Leadership, Uncertainty Avoidance, Trust, and Employee Creativity
This study was conducted in 2016 aimed to investigate the relationship between empowering leadership, uncertainty avoidance, trust, and employee creativity with regard to interaction effects and mediating mechanism. The population consists of 205 employees from the Nomadic affairs of Fars Province. In accordance with the Cochran formula, the sample size of 134 was calculated that were participa...
متن کاملAttribute-based group key establishment
Motivated by the problem of establishing a session key among parties based on the possession of certain credentials only, we discuss a notion of attribute-based key establishment. A number of new issues arise in this setting that are not present in the usual settings of group key establishment where unique user identities are assumed to be publicly available. After detailing the security model,...
متن کاملEmployee Trust and Workplace Performance
Employee Trust and Workplace Performance We explore the relationship between employee trust of managers and workplace performance. We present a theoretical framework which serves to establish a link between employee trust and firm performance as well as to identify possible mechanisms through which the relationship may operate. We then analyse matched workplace and employee data in order to asc...
متن کاملID-based One-pass Authenticated Key Establishment
One-pass authenticated key establishment (AKE) protocols are arguably better suited to the ID-based environment than their two-pass counterparts. However, there is no ID-based one-pass AKE protocol proposed in the literature with a proof of security in an appropriate model. This paper addresses the current gap by proposing a new ID-based one-pass AKE protocol and proving it secure in a formal m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Network Security & Its Applications
سال: 2016
ISSN: 0975-2307,0974-9330
DOI: 10.5121/ijnsa.2016.8102