Results 271 to 280 of about 1,483,664 (290)
Some of the next articles are maybe not open access.
2010
Our Timestamp key management scheme, like the Atallah et al. scheme aims to replace only the key associated with the group affected by a change in security policy. In this scheme, we use the idea that each key is associated to a unique value that is computed by a certified and trusted authority.
Selim G. Akl +2 more
openaire +2 more sources
Our Timestamp key management scheme, like the Atallah et al. scheme aims to replace only the key associated with the group affected by a change in security policy. In this scheme, we use the idea that each key is associated to a unique value that is computed by a certified and trusted authority.
Selim G. Akl +2 more
openaire +2 more sources
ACM SIGSAC Review, 1990
There are two main issues concerning data security on networks; controlling access and the vulnerability of data communication links. A brief introduction to the various techniques which may be applied to these concerns are given in this paper.
openaire +2 more sources
There are two main issues concerning data security on networks; controlling access and the vulnerability of data communication links. A brief introduction to the various techniques which may be applied to these concerns are given in this paper.
openaire +2 more sources
Key Management and the Public-Key Revolution
2020Jonathan Katz, Yehuda Lindell
openaire +2 more sources
Cryptography and Key Management
1999When a packet is routed from the source to the destination, it is routed through many intermediate nodes. It is at the intermediate nodes where anyone at one of the machines that handle the packets could reassemble the packets that make up the EDI Interchange and could therefore read it, copy it, alter it, or delete it.
openaire +2 more sources
2014
Der Key Account Manager muss seine Rolle als Verbindungsmann oder -frau zwischen seinem Unternehmen und den wichtigsten Kunden erkennen und wirksam spielen. Zu dieser Rolle gehort als erstes die Gestaltung und Abwicklung der laufenden Geschafte: 1. Sie werden von vornherein von ihren Vorgesetzten darauf gebrieft. 2.
openaire +2 more sources
Der Key Account Manager muss seine Rolle als Verbindungsmann oder -frau zwischen seinem Unternehmen und den wichtigsten Kunden erkennen und wirksam spielen. Zu dieser Rolle gehort als erstes die Gestaltung und Abwicklung der laufenden Geschafte: 1. Sie werden von vornherein von ihren Vorgesetzten darauf gebrieft. 2.
openaire +2 more sources
2007
The invention relates to a method of key management for group-based controlled access to encrypted data, in which a decryption key for the encrypted data can be obtained by a party if the party is a member of at least one group which is authorized to access the data, the groups being organized in a hierarchical tree in which each non-leaf node ...
Zych, Anna K. +4 more
openaire
The invention relates to a method of key management for group-based controlled access to encrypted data, in which a decryption key for the encrypted data can be obtained by a party if the party is a member of at least one group which is authorized to access the data, the groups being organized in a hierarchical tree in which each non-leaf node ...
Zych, Anna K. +4 more
openaire

