نتایج جستجو برای: key management
تعداد نتایج: 1347875 فیلتر نتایج به سال:
This article presents the approach followed in the United Arab Emirates (UAE) national ID scheme to register its population for the new smart ID card it launched in 2005. It presents how the organisation reengineered its operations to achieve its strategic objectives. It also presents some of the experienced challenges, and how they were dealt with. Some key management consideration areas were ...
In this paper, we review three problematic key management (KM) schemes recently proposed, including Kayam’s scheme for groups with hierarchy [10], Piao’s group KM scheme [14], Purushothama’s group KM schemes [17]. We point out the problems in each scheme. Kayam’s scheme is not secure to collusion attack. Piao’s group KM scheme is not secure. The hard problem it bases is not really hard. Purusho...
Wireless Sensor Network (WSN) consists of huge number of sensor nodes which are small and inexpensive with very limited resources. The public key cryptography is undesirable to be used in WSN because of the limitations of the resources. A key management and predistribution techniques are required to apply the symmetric key cryptography in such a big network. Many key predistribution techniques ...
nowadays, it is belived that human resource is competitve advantage so it’s a kind of organizition capital, and therefore focusing the valuable role of individuals in organization and their desirable management is very important and sensitive. talent managenent repersents a paradigm shift in traditional human resource managenent to new human resource management that includes attention to organi...
irrigation management transfer (imt) is under implementation within 63 countries over the world. the results and constraints of this event have been different in mentioned countries. this research objected to survey of imt constraints and identifies its key indicators in ghazvin and moghan pilots with different characteristics in type of irrigation and their imt process. the research method is ...
The DNS security extensions, DNSSEC, were standardized in 2005. Since the 2008 update, they have become available for general use. The implementation of the DNSSEC is a complex task, demanding software and hardware modifications throughout the entire DNS hierarchy. That is the reason why DNSSEC has only recently received more attention. The paper presents and compares current possibilities for ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید