Cryptographic key management for the masses

被引:0
|
作者
Potter, Bruce
机构
关键词
Computer crime - Computer privacy - Data privacy - Security of data;
D O I
10.1016/S1353-4858(06)70463-9
中图分类号
学科分类号
摘要
Keeping track of cryptographic keys has usually been considered something of a 'no-brainer' - simpler, in fact, than keeping tabs on what office keys users have. This must change, though, if a jangling result is to be avoided. © 2006 Elsevier Ltd. All rights reserved.
引用
收藏
页码:13 / 14
相关论文
共 50 条
  • [21] Cryptographic key recovery
    AlSalqan, YY
    PROCEEDINGS OF THE SIXTH IEEE COMPUTER SOCIETY WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, 1997, : 34 - 37
  • [22] Enhancing identity trust in cryptographic key management systems for dynamic environments
    Kayem, Anne V. D. M.
    Martin, Patrick
    Akl, Selim G.
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (01) : 79 - 94
  • [23] Cryptographic Key Management Methods for Mission-Critical Wireless Networks
    Li, Celia
    Yang, Cungang
    PROCEEDINGS OF 2017 IEEE 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2017, : 33 - 36
  • [24] A NEW DESIGN OF CRYPTOGRAPHIC KEY MANAGEMENT FOR HIPAA PRIVACY AND SECURITY REGULATIONS
    Huang, Hui-Feng
    Liu, Kuo-Ching
    Wang, Hsin-Wei
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (11A): : 3923 - 3931
  • [25] FPGA BASED REKEYING FOR CRYPTOGRAPHIC KEY MANAGEMENT IN STORAGE AREA NETWORK
    Wang, Yi
    Ha, Yajun
    2013 23RD INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS (FPL 2013) PROCEEDINGS, 2013,
  • [26] Selecting Cryptographic Key Sizes
    Arjen K. Lenstra
    Eric R. Verheul
    Journal of Cryptology, 2001, 14 : 255 - 293
  • [27] On optimal cryptographic key derivation
    Chan, Aldar C. -F.
    THEORETICAL COMPUTER SCIENCE, 2013, 489 : 21 - 36
  • [28] Key Expansion in Cryptographic Systems
    Chitu, Sorin
    Vasile, Daniel Ciprian
    Tramandan, Ionut Daniel
    Svasta, Paul
    2020 IEEE 26TH INTERNATIONAL SYMPOSIUM FOR DESIGN AND TECHNOLOGY IN ELECTRONIC PACKAGING (SIITME 2020), 2020, : 202 - 205
  • [29] Selecting cryptographic key sizes
    Lenstra, AK
    Verheul, ER
    JOURNAL OF CRYPTOLOGY, 2001, 14 (04) : 255 - 293
  • [30] Cryptographic Key Protection in a Cryptoprocessor
    Rajitha, N.
    Sridevi, R.
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 271 - 275