نتایج جستجو برای: key management
تعداد نتایج: 1347875 فیلتر نتایج به سال:
When a computer network grows larger and adds more services offered by different providers, each user may have to keep many keys for different services. Incorporating smart card technologies and master key concept, this letter proposes an efficient scheme to solve the key management problem in such multiservice environments.
There has been concern in the literature about the adequacy of the traditional model of marketing planning, which focuses on what decisions should be made and not on how to make them. The aim of this article is a new conceptualisation that proposes key management processes about how marketing planning decisions are made in a dynamic context. The motives for this conceptualisation are to contrib...
The problem of establishing symmetric keys in wireless sensor networks has been extensively studied, but other aspects of key management have received comparatively little attention. In this paper we consider the problem of refreshing keys that are shared among several nodes in a WSN, in order to provide forward security. We discuss several applications that lead to sensor networks with very di...
NOVEL METHODS FOR SECURITY PROTOCOLS AND KEY MANAGEMENT TECHNIQUES IN WIRELESS NETWORKS BASED ON SIGNCRYPTION AND HYBRID
Successful software development projects depend, among other things, on their project manager’s leadership capabilities. This paper analyzes how specific leadership styles of IT project managers contributed to the success of a large IT project realized by an IT service provider in India. We conducted an interpretive case study following the principles of the Grounded Theory Methodology to explo...
1 This report describes the first part of the evaluation of the Whitenoise cryptosystem. The second part of the evaluation is related to the evaluation of the key management facility.
We present a Digital Rights Management (DRM) system that supports what you see is what you pay. In our system, multimedia is compressed with a scalable codec and encrypted preserving the scalable granularity and multiaccess capability. This paper focuses on the DRM modules enabling efficient key generation and management. We employ a light license server which stores only the master keys of con...
Today, we face a growing interest in distributed businessto-business applications using the Internet as communication media. However, the involved security threats are often neglected in the design of such systems. In this paper, we present our security architecture for an Internet based virtual trading community. Our solution has been designed for an heterogeneous, distributed workflow managem...
Wireless networks are more vulnerable to security threats than wired networks. Since sensors are resource constrained, the use of traditional cryptographic key management techniques is not practical. Hence keys are distributed in sensor nodes prior to their deployment. This method, called key predistribution, was investigated recently in a number of studies. This chapter restricts the discussio...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید