منابع مشابه
Analysis of the various key management algorithms and new proposal in the secure multicast communications
With the evolution of the Internet, multicast communications seem particularly well adapted for large scale commercial distribution applications, for example, the pay TV channels and secure videoconferencing. Key management for multicast remains an open topic in secure Communications today. Key management mainly has to do with the distribution and update of keying material during the group life...
متن کاملHypercube Bivariate-Based Key Management for Wireless Sensor Networks
Wireless sensor networks are composed of very small devices, called sensor nodes,for numerous applications in the environment. In adversarial environments, the securitybecomes a crucial issue in wireless sensor networks (WSNs). There are various securityservices in WSNs such as key management, authentication, and pairwise keyestablishment. Due to some limitations on sensor nodes, the previous k...
متن کاملDisease management: a proposal for a new definition
1), I heard the words disease management being used for programs focusing on one single disease: for instance, diabetes or heart failure or depression or COPD. In Germany and Austria, the term disease management is monopolized for single disease programs with an emphasis on prevention and self-management by patients and family. These programs are financed by social insurance companies with spec...
متن کاملDisease management: a proposal for a new definition
As mentioned by Guus Schrijvers in his recent editorial [1], the term ‘disease management’ is used in different contexts and has several meanings. Besides, given the proliferation of expressions containing the word manage(ment), it is often misinterpreted, especially in non-English speaking countries. We agree that it would thus be very useful to agree on a common and consensual definition of d...
متن کاملSymmetric Key Management: A new approach
Many cryptographic algorithms (e.g., AES, HMAC) require the establishment of shared keying material in advance. The Federal key agreement schemes document is based on ANSI X9.42 agreement of symmetric keys using discrete logarithm cryptography, ANSI X9.44 key agreement and key transport using factoringbased cryptography and ANSI X9.63 key agreement and key transport using elliptic curve cryptog...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Conference on Aerospace Sciences and Aviation Technology
سال: 2011
ISSN: 2636-364X
DOI: 10.21608/asat.2011.27181