نتایج جستجو برای: key management

تعداد نتایج: 1347875  

Journal: :International Conference on Aerospace Sciences and Aviation Technology 2011

Journal: :IEEE Transactions on Industrial Informatics 2020

2016
Michael K Reiter Matthew K Franklin John B Lacy Rebecca N Wright

In this paper we introduce a distributed public key management service for open networks o ers interfaces by which clients can register retrieve and revoke public keys and escrow use to decrypt messages and recover private keys all of which can be subjected to access con trol policy is built using multiple servers in a way that ensures its correct operation despite the malicious corrup tion of ...

2012
Steve Kremer Robert Künnemann Graham Steel

We present the first universally composable key-management functionality, formalized in the GNUC framework by Hofheinz and Shoup. It allows the enforcement of a wide range of security policies and can be extended by diverse key usage operations with no need to repeat the security proof. We illustrate its use by proving an implementation of a security token secure with respect to arbitrary key-u...

2007
Ralph Spencer Poore

83.2 Key Management Myths .................................................... 1070 Myth 1: A Key Qualifies as “Randomly Generated” If One or More Persons Create the Key Components from Their Imagination † Myth 2: An “Authorized” Person Can Create or Enter Cryptographic Keys without Compromising a Key † Myth 3: Requiring a Second Person to Supervise or Observe the Key Entry Process Is Dual Cont...

Journal: :Market Infrastructure 2019

Journal: :The KIPS Transactions:PartC 2007

Journal: :SpringerBriefs on case studies of sustainable development 2023

Abstract A water demand management typology identifies three key WDM measures, namely: losses, economic instruments, and non-price mechanisms. The guidebook describes each of these measures provides case illustrations their effective implementation in different ASEAN cities.

1999
Rolf Oppliger

Many cryptographic key exchange and management protocols involve computationally expensive operations, such as modular exponentia-tions, and are therefore vulnerable to resource clogging attacks. This paper overviews and discusses the basic principles and the rationale behind an anti-clogging mechanism that was originally designed and proposed to protect the Photuris Session Key Management Prot...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید