Cryptographic key management for the masses

被引:0
|
作者
Potter, Bruce
机构
关键词
Computer crime - Computer privacy - Data privacy - Security of data;
D O I
10.1016/S1353-4858(06)70463-9
中图分类号
学科分类号
摘要
Keeping track of cryptographic keys has usually been considered something of a 'no-brainer' - simpler, in fact, than keeping tabs on what office keys users have. This must change, though, if a jangling result is to be avoided. © 2006 Elsevier Ltd. All rights reserved.
引用
收藏
页码:13 / 14
相关论文
共 50 条
  • [41] Cryptographic Key Regeneration from Speech
    Inthavisas, K.
    Sungprasert, N.
    WORLD CONGRESS ON ENGINEERING - WCE 2013, VOL II, 2013, : 933 - 940
  • [42] An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems
    Chaeikar, Saman Shojae
    Alizadeh, Mojtaba
    Tadayon, Mohammad Hesam
    Jolfaei, Alireza
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 10158 - 10171
  • [43] Cryptographic Key Extraction from Music
    Kumar, Chandan
    Dutta, Sandip
    Chakraborty, Soubhik
    ADVANCES IN COMPUTATIONAL INTELLIGENCE, 2017, 509 : 309 - 317
  • [44] Type-based analysis of key management in PKCS#11 cryptographic devices
    Centenaro, Matteo
    Focardi, Riccardo
    Luccio, Flaminia L.
    JOURNAL OF COMPUTER SECURITY, 2013, 21 (06) : 971 - 1007
  • [45] Cryptographic Public Key Length Prediction
    Amain, M.
    Batten, L. M.
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 27 - 35
  • [46] A Multivariate Public Key Cryptographic Scheme
    Yuan Feng
    Sun Ying
    Jiang Jijun
    Zhao Shangwei
    Xu Shengwei
    CHINA COMMUNICATIONS, 2014, 11 (12) : 120 - 124
  • [47] A New Public Key Cryptographic Scheme
    Yuan, Feng
    Ou, Haiwen
    Xu, Shengwei
    SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, PTS 1-4, 2013, 303-306 : 1944 - 1947
  • [48] Cryptographic key agreement for mobile radio
    Hassan, AA
    Stark, WE
    Hershey, JE
    Chennakeshu, S
    DIGITAL SIGNAL PROCESSING, 1996, 6 (04) : 207 - 212
  • [49] Random Room Noise for Cryptographic Key
    Abu, Nur Aman
    Muslim, Zulkiflee
    2008 2ND IEEE INTERNATIONAL CONFERENCE ON DIGITAL ECOSYSTEMS AND TECHNOLOGIES, 2008, : 46 - 52
  • [50] Cryptographic key generation from voice
    Monrose, F
    Reiter, MK
    Li, Q
    Wetzel, S
    2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, : 202 - 213