Results 1 to 10 of about 1,483,664 (290)
Bedeutende, uberregionale Kunden stellen den Vertrieb heute vor neue Herausforderungen, denen eine klassische Ausendienstorganisation nicht mehr gewachsen ist. Immer mehr Unternehmen schaffen deshalb besondere Betreuungsformen fur ihre wichtigsten Kunden, die sogenannten Key-Accounts.
Ove Jensen
+5 more sources
A Privacy-Preserving Key Management Scheme with Support for Sybil Attack Detection in VANETs [PDF]
Vehicular ad hoc networks (VANETs) face two important and conflicting challenges with regards to security: preserve the privacy of vehicles in order to prevent malicious entities from tracking users and detect and remove bad actors that attempt to game ...
L. Ellen Funderburg, Im-Yeong Lee
doaj +2 more sources
A Key Management Scheme Based on Pairing-Free Identity Based Digital Signature Algorithm for Heterogeneous Wireless Sensor Networks [PDF]
The secure transmission of data within a network has received great attention. As the core of the security management mechanism, the key management scheme design needs further research.
Erdong Yuan +4 more
doaj +2 more sources
A Hybrid Key Management Scheme for WSNs Based on PPBR and a Tree-Based Path Key Establishment Method [PDF]
With the development of wireless sensor networks (WSNs), in most application scenarios traditional WSNs with static sink nodes will be gradually replaced by Mobile Sinks (MSs), and the corresponding application requires a secure communication environment.
Ying Zhang +3 more
doaj +2 more sources
Key management for blockchain technology
Public Key Infrastructure (PKI) is used in Blockchain Technology to authenticate the entities and to ensure the integrity of the blockchain. Proper Protection of Bitcoin wallet is required for private keys, seeds and keys stored in external hardware in ...
Om Pal +3 more
doaj +1 more source
Distributed Key Management in Microgrids [PDF]
Security for smart industrial systems is prominent due to the proliferation of cyber threats threatening national critical infrastructures. Smart grid comes with intelligent applications that can utilize the bidirectional communication network among its entities. Microgrids are small-scale smart grids that enable Machine-to-Machine (M2M) communications
Vaios Bolgouras +3 more
openaire +2 more sources
Security Improve in ZigBee Protocol Based on RSA Public Algorithm in WSN [PDF]
ZigBee is consuming low energy and providing the protection in Wireless Sensor Networks. ZigBee pro is supporting most applications. In spite of improved the security, ZigBee pro weak in key administration. In this paper, we depend on Logistic Map Diffie
Nabaa Hasan, Alaa Farhan
doaj +1 more source
Research on key management and authentication protocol of PDA in smart grid
According to PDA in smart grid, which faced with security issues, key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.
YU Xiao, TIAN Li, WANG Jie, LIU Zhe
doaj +3 more sources
AbstractKey management describes how cryptographic keys are created, securely stored, distributed to the respective key holders, and used in accordance with protocol specifications. It is thus a cornerstone of most cryptographic systems and must be handled with care.
Krähenbühl, Cyrill, Perrig, Adrian
openaire +1 more source

