Results 21 to 30 of about 1,483,664 (290)
A Secure and Efficient Group Key Management Scheme for Clusters of String Inverters
A string inverter converts the low voltage direct current coming from the string of its Photovoltaic (PV) panels into alternating current to be exported to the grid.
Mariano Basile +3 more
doaj +1 more source
A Study on the Key Management Strategy for Wireless Sensor Networks
Many users who are in a cyber-space usually want to join the social group to have or to share their information. Now, there are two ways to join the group, the group manager invites them, and the users who want to join ask the owner. These days the group
Hoon KO +5 more
doaj +1 more source
Key management for substations: Symmetric keys, public keys or no keys? [PDF]
In this paper, we discuss symmetric-key and public-key protocols for key management in electricity transmission and distribution substations — both for communication within substations, and between substations and the network control center. Key management in the electricity network is widely regarded as a challenging problem, not only because of the ...
Ross Anderson +3 more
openaire +2 more sources
A Distributed Key Management Approach
Cloud computing provides reliable and highlyscalable access to resources over the internet. But outsourcing sensitive data to an probably untrusted cloud provider (third party) requires cryptographic methods like encryption. This paper presents a novel approach to a distributed cloud key management scheme.
Dowsley, Rafael +4 more
openaire +5 more sources
Deployment of Unmanned Aerial Vehicles (UAVs) continues to expand rapidly across a wide range of applications, including environmental monitoring, precision agriculture, and disaster response.
Sayani Sarkar +3 more
doaj +1 more source
MID-Crypt: A Cryptographic Algorithm for Advanced Medical Images Protection
Privacy-preserving of medical information (such as medical records and images) is an essential right for patients to ensure security against undesired access parties.
Ashraf Ahmad +5 more
doaj +1 more source
Industrial Automation and Control Systems (IACS) are broadly utilized in critical infrastructures for monitoring and controlling the industrial processes remotely. The real-time transmissions in such systems provoke security breaches.
Pramod T. C. +3 more
doaj +1 more source
Moving in the Dark: Enlightening the Spatial Population Ecology of European Cave Salamanders
We assessed individual interactions, movement ecology and activity patterns of a subterranean population of Speleomantes strinatii, applying spatial capture–recapture modeling to a photographic dataset of 104 individuals. ABSTRACT Space use and movement are fundamental aspects of organisms' ecology, mirroring individual fitness, behavior, and life ...
Giacomo Rosa +2 more
wiley +1 more source
Evolutionary interplay between viruses and R‐loops
Viruses interact with specialized nucleic acid structures called R‐loops to influence host transcription, epigenetic states, latency, and immune evasion. This Perspective examines the roles of R‐loops in viral replication, integration, and silencing, and how viruses co‐opt or avoid these structures.
Zsolt Karányi +4 more
wiley +1 more source
Key Management for SCADA [PDF]
In this paper we discuss various security aspects and requirements of the Supervisory Control and Data Acquisition (SCADA) system for the electric power grid. In particular we discuss a method of managing cryptographic keys and give sample cryptographic algorithms that are appropriate for the SCADA system.
Beaver, Cheryl L. +3 more
openaire +3 more sources

