Results 251 to 260 of about 1,483,664 (290)
Some of the next articles are maybe not open access.
2011
In secure communications, key management is not as simple as metal key management which is supposed to be in a key ring or simply put in a pocket. Suppose Alice wants to transmit some confidential information to Bob over the public networks such as the Internet, Alice could simply encrypt the message using a known cipher such as AES, and then transmit ...
Steve Lloyd, Carlisle Adams
openaire +2 more sources
In secure communications, key management is not as simple as metal key management which is supposed to be in a key ring or simply put in a pocket. Suppose Alice wants to transmit some confidential information to Bob over the public networks such as the Internet, Alice could simply encrypt the message using a known cipher such as AES, and then transmit ...
Steve Lloyd, Carlisle Adams
openaire +2 more sources
The Key to Risk Management: Management [PDF]
The Barings, Daiwa Bank and Sumitomo Corp. financial debacles in the mid-1990s suggest that management failures rather than misfortune, errors, or complexity are a major source of the risk of financial debacles. These errors are systematic and are a concommittant of the structure of trading and of human nature.
openaire +1 more source
Encryption Key Management [PDF]
SQL Server 2008 includes a comprehensive suite of modern encryption technologies. SQL Server provides access to encryption features, like cell-level encryption, database-level encryption, and built-in encryption key management. In this chapter, I’ll introduce the basics of SQL Server encryption, including the encryption hierarchy and encryption key ...
Michael Coles, Rodney Landrum
openaire +1 more source
2014 Fourth International Conference on Communication Systems and Network Technologies, 2014
In Worldwide Interoperability for Microwave Access (WiMAX) host mobility and secure communication is a big challenge due to the unreliable nature of wireless communication. Usually, cryptographic techniques are used for secure communication in networks, it may be wired and wireless. Cryptographic techniques are ineffective if its key management is weak
Himanshu Tiwari, Brijesh Kumar Chaurasia
openaire +2 more sources
In Worldwide Interoperability for Microwave Access (WiMAX) host mobility and secure communication is a big challenge due to the unreliable nature of wireless communication. Usually, cryptographic techniques are used for secure communication in networks, it may be wired and wireless. Cryptographic techniques are ineffective if its key management is weak
Himanshu Tiwari, Brijesh Kumar Chaurasia
openaire +2 more sources

