Results 21 to 30 of about 1,483,664 (290)

A Secure and Efficient Group Key Management Scheme for Clusters of String Inverters

open access: yesApplied Sciences, 2020
A string inverter converts the low voltage direct current coming from the string of its Photovoltaic (PV) panels into alternating current to be exported to the grid.
Mariano Basile   +3 more
doaj   +1 more source

A Study on the Key Management Strategy for Wireless Sensor Networks

open access: yesAdvances in Distributed Computing and Artificial Intelligence Journal, 2015
Many users who are in a cyber-space usually want to join the social group to have or to share their information. Now, there are two ways to join the group, the group manager invites them, and the users who want to join ask the owner. These days the group
Hoon KO   +5 more
doaj   +1 more source

Key management for substations: Symmetric keys, public keys or no keys? [PDF]

open access: yes2011 IEEE/PES Power Systems Conference and Exposition, 2011
In this paper, we discuss symmetric-key and public-key protocols for key management in electricity transmission and distribution substations — both for communication within substations, and between substations and the network control center. Key management in the electricity network is widely regarded as a challenging problem, not only because of the ...
Ross Anderson   +3 more
openaire   +2 more sources

A Distributed Key Management Approach

open access: yes2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2016
Cloud computing provides reliable and highlyscalable access to resources over the internet. But outsourcing sensitive data to an probably untrusted cloud provider (third party) requires cryptographic methods like encryption. This paper presents a novel approach to a distributed cloud key management scheme.
Dowsley, Rafael   +4 more
openaire   +5 more sources

Secure Communication in Drone Networks: A Comprehensive Survey of Lightweight Encryption and Key Management Techniques

open access: yesDrones
Deployment of Unmanned Aerial Vehicles (UAVs) continues to expand rapidly across a wide range of applications, including environmental monitoring, precision agriculture, and disaster response.
Sayani Sarkar   +3 more
doaj   +1 more source

MID-Crypt: A Cryptographic Algorithm for Advanced Medical Images Protection

open access: yesJournal of Sensor and Actuator Networks, 2022
Privacy-preserving of medical information (such as medical records and images) is an essential right for patients to ensure security against undesired access parties.
Ashraf Ahmad   +5 more
doaj   +1 more source

CKMI: Comprehensive Key Management Infrastructure Design for Industrial Automation and Control Systems

open access: yesFuture Internet, 2019
Industrial Automation and Control Systems (IACS) are broadly utilized in critical infrastructures for monitoring and controlling the industrial processes remotely. The real-time transmissions in such systems provoke security breaches.
Pramod T. C.   +3 more
doaj   +1 more source

Moving in the Dark: Enlightening the Spatial Population Ecology of European Cave Salamanders

open access: yesPopulation Ecology, EarlyView.
We assessed individual interactions, movement ecology and activity patterns of a subterranean population of Speleomantes strinatii, applying spatial capture–recapture modeling to a photographic dataset of 104 individuals. ABSTRACT Space use and movement are fundamental aspects of organisms' ecology, mirroring individual fitness, behavior, and life ...
Giacomo Rosa   +2 more
wiley   +1 more source

Evolutionary interplay between viruses and R‐loops

open access: yesFEBS Letters, EarlyView.
Viruses interact with specialized nucleic acid structures called R‐loops to influence host transcription, epigenetic states, latency, and immune evasion. This Perspective examines the roles of R‐loops in viral replication, integration, and silencing, and how viruses co‐opt or avoid these structures.
Zsolt Karányi   +4 more
wiley   +1 more source

Key Management for SCADA [PDF]

open access: yes, 2002
In this paper we discuss various security aspects and requirements of the Supervisory Control and Data Acquisition (SCADA) system for the electric power grid. In particular we discuss a method of managing cryptographic keys and give sample cryptographic algorithms that are appropriate for the SCADA system.
Beaver, Cheryl L.   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy