نتایج جستجو برای: key management system

تعداد نتایج: 3273501  

Abbasnia , Seyyed Mohammad , Aslipour , Hosein , Botshekan , Mohammad Hashem , Dehghan Dehnavi , Mohammad Ali , Mohagheghnia , Mohammad Javad ,

Background: To achieve the objectives of social security and health system, it is essential to enhance the level of efficiency of social insurance funds. To hit this target, the challenges of regulation improvement should be identified and addressed in these funds. Therefore, the present study aimed at identifying the key challenges of regulation and modeling the network of management and its e...

2013
Zongwei Zhou Jun Han Yue-Hsun Lin Adrian Perrig Virgil D. Gligor

Deploying a corporate key management system faces fundamental challenges, such as fine-grained key usage control and secure system administration. None of the current commercial systems (either based on software or hardware security modules) or research proposals adequately address both challenges with small and simple Trusted Computing Base (TCB). This paper presents a new key management archi...

2003
Yücel Karabulut

Access control in modern computing environments is different from access control in the traditional setting of operating systems. For distributed computing systems, specification and enforcement of permissions can be based on a public key infrastructure which deals with public keys for asymmetric cryptography. Previous approaches and their implementations for applying a public key infrastructur...

Journal: :I. J. Network Security 2015
Ashraf Aboshosha Kamal A. ElDahshan Eman K. Elsayed Ahmed A. Elngar

RC4 is the most widely used stream cipher algorithm. It is used to protect valuable electronic information. However, RC4 encryption algorithm suffers from a secret key generation as a seed problems. This paper proposes an intelligent dynamic secret key generation as a seed by employing an Evolutionary Algorithm (EA). The proposed RC4-EA method tends to enhance the RC4 encryption algorithm with ...

2007
Rakesh Bobba Himanshu Khurana

Decentralized group key management schemes for supporting secure group communication systems have been studied in the two flavors of contributory key agreement and decentralized key distribution. However, the primary focus has been on the former because the latter have been criticized for additional overheads of establishing secure channels and for the possibility of weak keys produced by the g...

Journal: :Computer Communications 2000
Jianying Zhou

Secure communication over the Internet becomes an essential requirement for any value-added Internet application. The use of cryptography for secure communication brings out the requirement of cryptographic key management. This paper examines some security issues on the Internet Key Exchange (IKE) protocol specified in RFC 2409. The investigation is intended for clarifying some specification am...

2001
Madalina Baltatu Antonio Lioy Dario Lombardo Daniele Mazzocchi

IPsec, the standard suite of protocols to provide security in IP networks, and IKE, the commonly used key management protocol for IPsec, do not address the more general problem of how security policies should be distributed to IPsec nodes. Recent IETF work in the area of network security provides a definition of the basic requirements of an IP Security Policy System (IPSP) and a proposal of a S...

2000
J. Zhou

Secure communication over the Internet becomes an essential requirement for any value-added Internet application. The use of cryptography for secure communication brings out the requirement of cryptographic key management. This paper examines some security issues on the Internet Key Exchange (IKE) protocol specified in RFC 2409. The investigation is intended for clarifying some specification am...

Journal: :EURASIP J. Wireless Comm. and Networking 2008
Chin-Ling Chen Cheng-Ta Li

Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must be used to protect the transmission between the sensor nodes. Most of the existing methods consist of preselecting m keys from a key pool and forming a key chain. Then, the sensor nodes mak...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید