[go: up one dir, main page]

Fumy et al., 1993 - Google Patents

Principles of key management

Fumy et al., 1993

Document ID
8256028576522087752
Author
Fumy W
Landrock P
Publication year
Publication venue
IEEE Journal on selected areas in communications

External Links

Snippet

Security services based on cryptographic mechanisms assume keys to be distributed prior to secure communications. The secure management of these keys is one of the most critical elements when integrating cryptographic functions into a system, since any security concept …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B19/00Keys; Accessories therefor
    • E05B19/0017Key profiles

Similar Documents

Publication Publication Date Title
Fumy et al. Principles of key management
Shirey RFC 4949: Internet security glossary, version 2
Shirey Internet security glossary, version 2
Shirey Internet security glossary
Needham et al. Using encryption for authentication in large networks of computers
US5557765A (en) System and method for data recovery
US7234059B1 (en) Anonymous authenticated communications
US6948064B2 (en) Method and apparatus for providing public key security control for a cryptographic processor
CN101569132A (en) Systems and methods for distributing and securing data
Gritzalis et al. A digital seal solution for deploying trust on commercial transactions
Phoha Internet security dictionary
CZ9904106A3 (en) Auto-recoverable auto-certifiable cryptosystems
Janson et al. Security in open networks and distributed systems
Kou Networking security and standards
Anderson et al. The GCHQ protocol and its problems
Lee Guideline for implementing cryptography in the federal government
Prabhu et al. Security in computer networks and distributed systems
Vandenwauver et al. Security of Client-Server Systems
Fumy Key management techniques
Recomendation The Directory Authentication Framework
Jiang et al. sMAC: Sanitizable Access Control with Encrypted Message Moderation
Fumy Key management
Kaur et al. Pre-requisite Concepts for Security and Privacy
Benson Portable security transaction protocol
Purser COSINE Sub-Project P8: security services