نتایج جستجو برای: distribution management

تعداد نتایج: 1427238  

2007
Thierry Sans Frédéric Cuppens Nora Cuppens-Boulahia

Digital Rights Management frameworks (DRM) aim at protecting and controlling information contents widely distributed on client devices. Using a license, the content owner specifies which rights can be rendered to end-users. Basically, only the content owner must be able to define this license, but some DRM models go further. In superdistribution scenario, the content owner does not directly man...

Journal: :JCM 2008
Li Xu Jianwei Chen Xiaoding Wang

Secure group key distribution and efficient rekeying is one of the most challenging security issues in sensor networks at present. In this paper, Latin square is firstly used to construct orthogonal arrays in order to obtain t-packing designs quickly. Based on cover-free family properties, t-packing designs are adopted in key predistribution phase. Then based secure key-shared method, the pre-d...

2017
Hao Shen Xuanjin Meng Rongjie Guo Yuyan Zhao Siyi Ding Xiaojin Meng

Gold has been recognized as the most important precious metals in the human society. Other than as a medium of exchange, gold has been a consumption and investment product for a long history. It has been recognized a well-positive role in portfolio performance by many financial market practitioners. During the recent financial crisis, gold spot prices have exhibited significant volatility. Thus...

Journal: :Educational Technology & Society 2015
Lanqin Zheng Ronghuai Huang Gwo-Jen Hwang Kaicheng Yang

The purpose of this study is to quantitatively measure the level of knowledge elaboration and explore the relationships between prior knowledge of a group, group performance, and knowledge elaboration in collaborative learning. Two experiments were conducted to investigate the level of knowledge elaboration. The collaborative learning objective in the first experiment concerned the understandin...

Journal: :IT & People 2003
Peter H. Gray Darren B. Meister

Knowledge management (KM) research lacks a common conceptual core; it is cross-disciplinary, addresses a wide variety of phenomena, and has dif®culty distinguishing itself from many related areas of research. The result is a fragmented ®eld that is itself arti®cially split from the related literature on organizational learning. KM may be progressing through a predictable life-cycle that could e...

Journal: :Int. J. Communication Systems 2011
Min Chen Liang Zhou Takahiro Hara Yang Xiao Victor C. M. Leung

Recent advances in communications technologies have witnessed a growing and evolving multimedia content delivery market based on information gathering, manipulation, and dissemination. It is a fact that personal communications, computing, broadcasting, entertainment, etc. have turned into streams of multimedia content, and the various communication and network technologies have become the means...

2010
Avinash Kumar Chaurasia R. K. Ghosh

In this paper we propose a light-weight random key pre-distributed scheme based on deployment knowledge. It uses only one hop for key distribution. It leads to a substantial reduction in energy requirement while improving key sharing and resilience factor compared to the scheme proposed in [1]. We develop the theoretical background of the proposed scheme and explain why the proposed scheme perf...

1990
Walter Fumy Michael Munzert

The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic mechanisms. As a result of varied design decisions appropriate to different conditions, a large variety of key distribution protocols exist. There is a need tu explicate key distribution protocols in a way that allows to understand which results t...

2008
Abraham Jibi K. S. Ramanatha

Wireless Sensor Networks are prone to many security attacks. The most complex among them is the node compromise attack. Networks enhanced with services like aggregation and security require a different intrusion detection mechanism than the generally used solutions and there is a possibility of a compromised node producing false intrusion detection alarms. Therefore we need suitable mechanisms ...

2011

The Strategic National Risk Assessment (SNRA) was executed in support of Presidential Policy Directive 8 (PPD-8), which calls for creation of a National Preparedness Goal, a National Preparedness System, and a National Preparedness Report. Specifically, national preparedness is to be based on core capabilities that support ―strengthening the security and resilience of the United States through ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید