Results 281 to 290 of about 6,477,960 (317)
Some of the next articles are maybe not open access.
2011
In secure communications, key management is not as simple as metal key management which is supposed to be in a key ring or simply put in a pocket. Suppose Alice wants to transmit some confidential information to Bob over the public networks such as the Internet, Alice could simply encrypt the message using a known cipher such as AES, and then transmit ...
Steve Lloyd, Carlisle Adams
+5 more sources
In secure communications, key management is not as simple as metal key management which is supposed to be in a key ring or simply put in a pocket. Suppose Alice wants to transmit some confidential information to Bob over the public networks such as the Internet, Alice could simply encrypt the message using a known cipher such as AES, and then transmit ...
Steve Lloyd, Carlisle Adams
+5 more sources
2012
Abstract This chapter focuses on the fundamental principles and techniques relating to key management. Since key management needs to be tailored to the environment within which cryptography is being used, this chapters discusses the pros and cons of different approaches to the management of cryptographic keys.
openaire +2 more sources
Abstract This chapter focuses on the fundamental principles and techniques relating to key management. Since key management needs to be tailored to the environment within which cryptography is being used, this chapters discusses the pros and cons of different approaches to the management of cryptographic keys.
openaire +2 more sources
2017
This chapter provides an understanding of the fundamental principles behind key management. We consider the typical stages in the lifecycle of a cryptographic key and then review each of these stages in some detail. We discuss the choosing of key lengths and look at different techniques for key generation, including key derivation and generation from ...
openaire +1 more source
This chapter provides an understanding of the fundamental principles behind key management. We consider the typical stages in the lifecycle of a cryptographic key and then review each of these stages in some detail. We discuss the choosing of key lengths and look at different techniques for key generation, including key derivation and generation from ...
openaire +1 more source
2009
SQL Server 2008 includes a comprehensive suite of modern encryption technologies. SQL Server provides access to encryption features, like cell-level encryption, database-level encryption, and built-in encryption key management. In this chapter, I’ll introduce the basics of SQL Server encryption, including the encryption hierarchy and encryption key ...
Michael Coles, Rodney Landrum
openaire +1 more source
SQL Server 2008 includes a comprehensive suite of modern encryption technologies. SQL Server provides access to encryption features, like cell-level encryption, database-level encryption, and built-in encryption key management. In this chapter, I’ll introduce the basics of SQL Server encryption, including the encryption hierarchy and encryption key ...
Michael Coles, Rodney Landrum
openaire +1 more source
1998
Security services based on cryptographic mechanisms assume cryptographic keys to be available to the communicating parties prior to secure communications. Key management techniques depend on the underlying cryptographic techniques, the intended use of the keys and the security policy in use.
openaire +1 more source
Security services based on cryptographic mechanisms assume cryptographic keys to be available to the communicating parties prior to secure communications. Key management techniques depend on the underlying cryptographic techniques, the intended use of the keys and the security policy in use.
openaire +1 more source

