AUTOMATED DISTRIBUTION OF CRYPTOGRAPHIC KEYS USING THE FINANCIAL INSTITUTION KEY MANAGEMENT STANDARD

被引:0
|
作者
BALENSON, DM [1 ]
机构
[1] UNIV MARYLAND,COMP SCI,COLLEGE PK,MD 20742
关键词
D O I
10.1109/MCOM.1985.1092642
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
引用
收藏
页码:41 / 46
页数:6
相关论文
共 35 条
  • [1] Key Management Techniques for Controlling the Distribution and Update of Cryptographic keys
    Lalith, T.
    Umarani, R.
    Kadharnawaz, G. M.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2010, 1 (06) : 163 - 166
  • [2] LIFETIMES OF KEYS IN CRYPTOGRAPHIC KEY MANAGEMENT-SYSTEMS
    OKAMOTO, E
    NAKAMURA, K
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 246 - 259
  • [3] On replacing cryptographic keys in hierarchical key management systems
    Kayem, Anne
    Akl, Selim
    Martin, Patrick
    JOURNAL OF COMPUTER SECURITY, 2008, 16 (03) : 289 - 309
  • [4] Secured Key Distribution Scheme for Cryptographic Key Management System
    Khaing, Kyawt Kyawt
    Aung, Khin Mi Mi
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 481 - 486
  • [5] CRYPTOGRAPHIC KEY MANAGEMENT SCHEME FOR IMPLEMENTING DATA ENCRYPTION STANDARD
    EHRSAM, WF
    MATYAS, SM
    MEYER, CH
    TUCHMAN, WL
    IBM SYSTEMS JOURNAL, 1978, 17 (02) : 106 - 125
  • [6] Using quantum key distribution for cryptographic purposes: A survey
    Alleaume, R.
    Branciard, C.
    Bouda, J.
    Debuisschert, T.
    Dianati, M.
    Gisin, N.
    Godfrey, M.
    Grangier, P.
    Laenger, T.
    Luetkenhaus, N.
    Monyk, C.
    Painchault, P.
    Peev, M.
    Poppe, A.
    Pornin, T.
    Rarity, J.
    Renner, R.
    Ribordy, G.
    Riguidel, M.
    Salvail, L.
    Shields, A.
    Weinfurter, H.
    Zeilinger, A.
    THEORETICAL COMPUTER SCIENCE, 2014, 560 : 62 - 81
  • [7] An edge computing oriented unified cryptographic key management service for financial context
    Chen, Jingjing
    Guo, Lingling
    Shi, Yulun
    Shi, Yao
    Ruan, Yi
    WIRELESS NETWORKS, 2024, 30 (05) : 4003 - 4016
  • [8] Group key management in wireless networks using session keys
    Damodaran, Dhilak
    Singh, Rohit
    Le, Phu Dung
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 402 - +
  • [9] Data Exchange Protocol for Cryptographic Key Distribution System Using MQTT Service
    Furtak, Janusz
    PROCEEDINGS OF THE 2022 17TH CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENCE SYSTEMS (FEDCSIS), 2022, : 611 - 615
  • [10] Cryptographic Key Management Using Fuzzy Vault Based on Statistical Analysis of Iris
    Fatangare, Mrunal
    Honwadkar, K. N.
    COMPUTATIONAL INTELLIGENCE AND INFORMATION TECHNOLOGY, 2011, 250 : 55 - +