Cryptographic key management for the masses

被引:0
|
作者
Potter, Bruce
机构
关键词
Computer crime - Computer privacy - Data privacy - Security of data;
D O I
10.1016/S1353-4858(06)70463-9
中图分类号
学科分类号
摘要
Keeping track of cryptographic keys has usually been considered something of a 'no-brainer' - simpler, in fact, than keeping tabs on what office keys users have. This must change, though, if a jangling result is to be avoided. © 2006 Elsevier Ltd. All rights reserved.
引用
收藏
页码:13 / 14
相关论文
共 50 条
  • [31] Design of a Secure Chat Application based on AES Cryptographic Algorithm and Key Management
    Bardis, Nikolaos G.
    Ntaikos, Konstantinos
    MATHEMATICAL METHODS, COMPUTATIONAL TECHNIQUES, NON-LINEAR SYSTEMS, INTELLIGENT SYSTEMS, 2008, : 486 - +
  • [32] An edge computing oriented unified cryptographic key management service for financial context
    Chen, Jingjing
    Guo, Lingling
    Shi, Yulun
    Shi, Yao
    Ruan, Yi
    WIRELESS NETWORKS, 2024, 30 (05) : 4003 - 4016
  • [33] Simple Cryptographic Key Management Scheme of the Electronic Control Unit in the Lifecycle of a Vehicle
    Sakon T.
    Nakamoto Y.
    SAE International Journal of Transportation Cybersecurity and Privacy, 2021, 3 (02):
  • [34] Cryptographic Key Management Using Fuzzy Vault Based on Statistical Analysis of Iris
    Fatangare, Mrunal
    Honwadkar, K. N.
    COMPUTATIONAL INTELLIGENCE AND INFORMATION TECHNOLOGY, 2011, 250 : 55 - +
  • [35] A Cryptographic and Key Management Glance at Cybersecurity Challenges of the Future European Railway System
    Kiviharju, Mikko
    Lassfolk, Christina
    Rikkonen, Sanna
    Kari, Hannu
    2022 14TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT: KEEP MOVING (CYCON), 2022, : 265 - 284
  • [36] Hybrid cryptographic approach to enhance the mode of key management system in cloud environment
    Shahnawaz Ahmad
    Shabana Mehfuz
    Javed Beg
    The Journal of Supercomputing, 2023, 79 : 7377 - 7413
  • [37] AUTOMATED DISTRIBUTION OF CRYPTOGRAPHIC KEYS USING THE FINANCIAL INSTITUTION KEY MANAGEMENT STANDARD
    BALENSON, DM
    IEEE COMMUNICATIONS MAGAZINE, 1985, 23 (09) : 41 - 46
  • [38] Hybrid cryptographic approach to enhance the mode of key management system in cloud environment
    Ahmad, Shahnawaz
    Mehfuz, Shabana
    Beg, Javed
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (07): : 7377 - 7413
  • [39] AI-Enabled Cryptographic Key Management Model for Secure Communications in the Internet of Vehicles
    Chaeikar, Saman Shojae
    Jolfaei, Alireza
    Mohammad, Nazeeruddin
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (04) : 4589 - 4598
  • [40] Attacking Cryptographic Key Exchange with Precomputation
    Boneh, Dan
    COMMUNICATIONS OF THE ACM, 2019, 62 (01) : 105 - 105