Results 11 to 20 of about 6,579,728 (290)
Research on key management and authentication protocol of PDA in smart grid
According to PDA in smart grid,which faced with security issues,key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.With the construction of mobile trusted platform by trusted hardware module and PDA,a ...
Xiao YU, Li TIAN, Zhe LIU, Jie WANG
doaj +3 more sources
Security Improve in ZigBee Protocol Based on RSA Public Algorithm in WSN [PDF]
ZigBee is consuming low energy and providing the protection in Wireless Sensor Networks. ZigBee pro is supporting most applications. In spite of improved the security, ZigBee pro weak in key administration. In this paper, we depend on Logistic Map Diffie
Nabaa Hasan, Alaa Farhan
doaj +1 more source
Key management scheme with private key self-healing ability in DTN
Because of the large delay of DTN network,node cannot receive broadcast updating private key messages in a timely manner,thus unable to update the private key for a certain time period.Aiming at this problem,an allowing private key self-healing ...
De-quan LI,Xi-yong ZHANG,Ting-ting ZHANG +1 more
doaj +1 more source
Key management for blockchain technology
Public Key Infrastructure (PKI) is used in Blockchain Technology to authenticate the entities and to ensure the integrity of the blockchain. Proper Protection of Bitcoin wallet is required for private keys, seeds and keys stored in external hardware in ...
Om Pal +3 more
doaj +1 more source
Key management describes how cryptographic keys are created, securely stored, distributed to the respective key holders, and used in accordance with protocol specifications. It is thus a cornerstone of most cryptographic systems and must be handled with care.
Krähenbühl, Cyrill +1 more
openaire +3 more sources
MID-Crypt: A Cryptographic Algorithm for Advanced Medical Images Protection
Privacy-preserving of medical information (such as medical records and images) is an essential right for patients to ensure security against undesired access parties.
Ashraf Ahmad +5 more
doaj +1 more source
A Novel Privacy Preserving Scheme for Smart Grid-Based Home Area Networks
Despite the benefits of smart grids, concerns about security and privacy arise when a large number of heterogeneous devices communicate via a public network.
Wajahat Ali +3 more
doaj +1 more source
EStore: A User-Friendly Encrypted Storage Scheme for Distributed File Systems
In this paper, we propose a user-friendly encrypted storage scheme named EStore, which is based on the Hadoop distributed file system. Users can make use of cloud-based distributed file systems to collaborate with each other.
Yuxiang Chen +4 more
doaj +1 more source
Disability management: Key concepts and techniques for an aging workforce [PDF]
The aging workforce is likely to result in increasing numbers of workers with disabilities. The U.S. Census Bureau projects that the 45-54 and 55-64 year-old population in the United States will grow by nearly 44.2 million (17%) and 35 million (39%) in ...
Bruyere, Susanne M, Dr.
core +2 more sources
Strategic Human Resource Management Measures: Key Linkages and the PeopleVantage Model [PDF]
The field of human resource management faces a significant dilemma. While emerging evidence, theory and practical demands are increasing the visibility and credibility of human capital as a key to organizational success, the measures used to articulate ...
Boudreau , John W.
core +2 more sources

