Cryptographic key management for the masses

被引:0
|
作者
Potter, Bruce
机构
关键词
Computer crime - Computer privacy - Data privacy - Security of data;
D O I
10.1016/S1353-4858(06)70463-9
中图分类号
学科分类号
摘要
Keeping track of cryptographic keys has usually been considered something of a 'no-brainer' - simpler, in fact, than keeping tabs on what office keys users have. This must change, though, if a jangling result is to be avoided. © 2006 Elsevier Ltd. All rights reserved.
引用
收藏
页码:13 / 14
相关论文
共 50 条
  • [1] Injecting Trust to Cryptographic Key Management
    Bal, Goekhan
    Schmidt, Andreas U.
    Kuntze, Nicolai
    11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 1197 - +
  • [2] Reliability Analysis for Cryptographic Key Management
    Xiao, Sheng
    Gong, Weibo
    Towsley, Don
    Zhang, Qingquan
    Zhu, Ting
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 999 - 1004
  • [3] ON A CERTAIN MODEL OF CRYPTOGRAPHIC KEY MANAGEMENT
    Nyssanbayeva, S. E.
    Kapalova, N. A.
    Haumen, A.
    EURASIAN JOURNAL OF MATHEMATICAL AND COMPUTER APPLICATIONS, 2020, 8 (04): : 15 - 22
  • [4] Secured Key Distribution Scheme for Cryptographic Key Management System
    Khaing, Kyawt Kyawt
    Aung, Khin Mi Mi
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 481 - 486
  • [5] SIKM - a smart cryptographic key management framework
    Chaeikar, Saman Shojae
    Ahmadi, Ali
    Karamizadeh, Sasan
    Chaeikar, Nakisa Shoja
    OPEN COMPUTER SCIENCE, 2022, 12 (01): : 17 - 26
  • [6] A FRAMEWORK FOR SECURE CRYPTOGRAPHIC KEY MANAGEMENT SYSTEMS
    Varalakshmi, P.
    Shajina, A. R.
    Kanimozhi, T.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 319 - 323
  • [7] Scalable cryptographic key management in wireless sensor networks
    Wadaa, A
    Olariu, S
    Wilson, L
    Eltoweissy, M
    24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, PROCEEDINGS, 2004, : 796 - 802
  • [8] Cryptographic key management for SCADA systems -: issues and perspectives
    Pietre-Cambacedes, Ludovic
    Sitbon, Pascal
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 156 - 161
  • [9] Cryptographic Key Management for SCADA Systems, Issues and Perspectives
    Pietre-Cambacedes, Ludovic
    Sitbon, Pascal
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2008, 2 (03): : 31 - 40
  • [10] A Framework for Self-Protecting Cryptographic Key Management
    Kayem, Anne V. D. M.
    Martin, Patrick
    Akl, Selim G.
    Powley, Wendy
    SASO 2008: SECOND IEEE INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS, PROCEEDINGS, 2008, : 191 - 200