Fumy et al., 1993 - Google Patents
Principles of key managementFumy et al., 1993
- Document ID
- 8256028576522087752
- Author
- Fumy W
- Landrock P
- Publication year
- Publication venue
- IEEE Journal on selected areas in communications
External Links
Snippet
Security services based on cryptographic mechanisms assume keys to be distributed prior to secure communications. The secure management of these keys is one of the most critical elements when integrating cryptographic functions into a system, since any security concept …
- 238000000034 method 0 description 47
Classifications
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B19/00—Keys; Accessories therefor
- E05B19/0017—Key profiles
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fumy et al. | Principles of key management | |
Shirey | RFC 4949: Internet security glossary, version 2 | |
Shirey | Internet security glossary, version 2 | |
Shirey | Internet security glossary | |
Needham et al. | Using encryption for authentication in large networks of computers | |
US5557765A (en) | System and method for data recovery | |
US7234059B1 (en) | Anonymous authenticated communications | |
US6948064B2 (en) | Method and apparatus for providing public key security control for a cryptographic processor | |
CN101569132A (en) | Systems and methods for distributing and securing data | |
Gritzalis et al. | A digital seal solution for deploying trust on commercial transactions | |
Phoha | Internet security dictionary | |
CZ9904106A3 (en) | Auto-recoverable auto-certifiable cryptosystems | |
Janson et al. | Security in open networks and distributed systems | |
Kou | Networking security and standards | |
Anderson et al. | The GCHQ protocol and its problems | |
Lee | Guideline for implementing cryptography in the federal government | |
Prabhu et al. | Security in computer networks and distributed systems | |
Vandenwauver et al. | Security of Client-Server Systems | |
Fumy | Key management techniques | |
Recomendation | The Directory Authentication Framework | |
Jiang et al. | sMAC: Sanitizable Access Control with Encrypted Message Moderation | |
Fumy | Key management | |
Kaur et al. | Pre-requisite Concepts for Security and Privacy | |
Benson | Portable security transaction protocol | |
Purser | COSINE Sub-Project P8: security services |