共 50 条
- [1] Injecting Trust to Cryptographic Key Management 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 1197 - +
- [2] Reliability Analysis for Cryptographic Key Management 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 999 - 1004
- [3] ON A CERTAIN MODEL OF CRYPTOGRAPHIC KEY MANAGEMENT EURASIAN JOURNAL OF MATHEMATICAL AND COMPUTER APPLICATIONS, 2020, 8 (04): : 15 - 22
- [4] Secured Key Distribution Scheme for Cryptographic Key Management System FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 481 - 486
- [5] SIKM - a smart cryptographic key management framework OPEN COMPUTER SCIENCE, 2022, 12 (01): : 17 - 26
- [6] A FRAMEWORK FOR SECURE CRYPTOGRAPHIC KEY MANAGEMENT SYSTEMS 2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 319 - 323
- [7] Scalable cryptographic key management in wireless sensor networks 24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, PROCEEDINGS, 2004, : 796 - 802
- [8] Cryptographic key management for SCADA systems -: issues and perspectives PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 156 - 161
- [9] Cryptographic Key Management for SCADA Systems, Issues and Perspectives INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2008, 2 (03): : 31 - 40
- [10] A Framework for Self-Protecting Cryptographic Key Management SASO 2008: SECOND IEEE INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS, PROCEEDINGS, 2008, : 191 - 200