Results 1 to 10 of about 1,483,664 (290)

Key-Account-Management [PDF]

open access: green, 2001
Bedeutende, uberregionale Kunden stellen den Vertrieb heute vor neue Herausforderungen, denen eine klassische Ausendienstorganisation nicht mehr gewachsen ist. Immer mehr Unternehmen schaffen deshalb besondere Betreuungsformen fur ihre wichtigsten Kunden, die sogenannten Key-Accounts.
Ove Jensen
  +5 more sources

A Privacy-Preserving Key Management Scheme with Support for Sybil Attack Detection in VANETs [PDF]

open access: yesSensors, 2021
Vehicular ad hoc networks (VANETs) face two important and conflicting challenges with regards to security: preserve the privacy of vehicles in order to prevent malicious entities from tracking users and detect and remove bad actors that attempt to game ...
L. Ellen Funderburg, Im-Yeong Lee
doaj   +2 more sources

A Key Management Scheme Based on Pairing-Free Identity Based Digital Signature Algorithm for Heterogeneous Wireless Sensor Networks [PDF]

open access: yesSensors, 2020
The secure transmission of data within a network has received great attention. As the core of the security management mechanism, the key management scheme design needs further research.
Erdong Yuan   +4 more
doaj   +2 more sources

A Hybrid Key Management Scheme for WSNs Based on PPBR and a Tree-Based Path Key Establishment Method [PDF]

open access: yesSensors, 2016
With the development of wireless sensor networks (WSNs), in most application scenarios traditional WSNs with static sink nodes will be gradually replaced by Mobile Sinks (MSs), and the corresponding application requires a secure communication environment.
Ying Zhang   +3 more
doaj   +2 more sources

Key management for blockchain technology

open access: yesICT Express, 2021
Public Key Infrastructure (PKI) is used in Blockchain Technology to authenticate the entities and to ensure the integrity of the blockchain. Proper Protection of Bitcoin wallet is required for private keys, seeds and keys stored in external hardware in ...
Om Pal   +3 more
doaj   +1 more source

Distributed Key Management in Microgrids [PDF]

open access: yesIEEE Transactions on Industrial Informatics, 2020
Security for smart industrial systems is prominent due to the proliferation of cyber threats threatening national critical infrastructures. Smart grid comes with intelligent applications that can utilize the bidirectional communication network among its entities. Microgrids are small-scale smart grids that enable Machine-to-Machine (M2M) communications
Vaios Bolgouras   +3 more
openaire   +2 more sources

Security Improve in ZigBee Protocol Based on RSA Public Algorithm in WSN [PDF]

open access: yesEngineering and Technology Journal, 2019
ZigBee is consuming low energy and providing the protection in Wireless Sensor Networks. ZigBee pro is supporting most applications. In spite of improved the security, ZigBee pro weak in key administration. In this paper, we depend on Logistic Map Diffie
Nabaa Hasan, Alaa Farhan
doaj   +1 more source

Research on key management and authentication protocol of PDA in smart grid

open access: yes网络与信息安全学报, 2018
According to PDA in smart grid, which faced with security issues, key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.
YU Xiao, TIAN Li, WANG Jie, LIU Zhe
doaj   +3 more sources

Key Management

open access: yes, 2023
AbstractKey management describes how cryptographic keys are created, securely stored, distributed to the respective key holders, and used in accordance with protocol specifications. It is thus a cornerstone of most cryptographic systems and must be handled with care.
Krähenbühl, Cyrill, Perrig, Adrian
openaire   +1 more source

Home - About - Disclaimer - Privacy