1,584,288 research outputs found

    Group Key Management Techniques

    Get PDF
    The most widely used technique in a network is Group communication. This helps in the reduction of the bandwidth usage. The major concern in group communication is its security of messages. Group key provides security of messages and hence proper group key management is very important in a group communication. There are various classifications of group key management techniques. A survey of these key management techniques is done in this paper

    Disability management: Key concepts and techniques for an aging workforce

    Get PDF
    The aging workforce is likely to result in increasing numbers of workers with disabilities. The U.S. Census Bureau projects that the 45-54 and 55-64 year-old population in the United States will grow by nearly 44.2 million (17%) and 35 million (39%) in the next ten years (U.S. Census Bureau, 2004). By the year 2010, this group will account for nearly half (44%) of the working age population (20-64), and the number of people with disabilities between the ages of 50 and 65 will almost double (Weathers, 2006). Disability management and accommodation policies and practices readily lend themselves to addressing the challenges employers will face with an aging workforce, and the increasing prevalence of disability which these demographics bring. Proactive education about ways to maximize the productivity of an aging workforce, effective case management, and workplace accommodation can significantly contribute to maximizing aging worker retention

    Key Management Techniques for Wireless Mesh Network

    Get PDF
    Key management is one of the most important tasks in wireless mesh network. This service is responsible for key generation, distribution, and key exchange in a cryptography-based system. Due to the shared nature of WMNs and absence of globally trusted central authority, key management becomes more challenging. This chapter introduces several key management methods that can address these challenges. The fundamental approach is the secret sharing scheme created by A. Shamir, which effectively distributes keys to all participants’ network. Based on Shamir’s scheme, many authors proposed other algorithms to secure the communication channel in such a way that adversary cannot steal any information about the secret. In addition, in this chapter, a new secret sharing method using real-time synchronization among transceiver devices is presented. In this method, each node generates its key depending on its physical information and the real-time clock. Therefore, public and private keys can be managed efficiently for data encryption and prevent several external attacks to WMNs. A specific protocol is proposed to secure keys while transferring between devices to prevent internal attacks

    Knowledge organization or information organization : a key component of knowledge management activities

    Get PDF
    This paper focuses on the various bibliographic and information retrieval tools and techniques used for information organization, a key activity in a knowledge management process. The paper begins with the existing debate on the very concept of knowledge management, and looks at some recent papers and arguments on this issue. It then briefly discusses how some projects over the past decade or so have used various traditional bibliographic organization tools for providing access to electronic resources. This follows examples of some sophistical information organization techniques used by some speciality search engines. It is argued that these tools and techniques, although are quite useful, cannot be used as such in a knowledge management environment. A generic model of information access in a knowledge management environment is then proposed, and new areas of research, especially in the context of information organization are discussed

    Application of NASA management approach to solve complex problems on earth

    Get PDF
    The application of NASA management approach to solving complex problems on earth is discussed. The management of the Apollo program is presented as an example of effective management techniques. Four key elements of effective management are analyzed. Photographs of the Cape Kennedy launch sites and supporting equipment are included to support the discussions

    Stealth address and key management techniques in blockchain systems

    Get PDF
    Bitcoin is an open source payment system with a market capitalization of about 15 G$. During the years several key management solutions have been proposed to enhance bitcoin. The common characteristic of these techniques is that they allow to derive public keys independently of the private keys, and that these keys match. In this paper we overview the historical development of such techniques, specify and compare all major variants proposed or used in practical systems. We show that such techniques can be designed based on 2 distinct ECC arithmetic properties and how to combine both. A major trend in blockchain systems is to use by Stealth Address (SA) techniques to make different payments made to the same payee unlikable. We review all known SA techniques and show that early variants are less secure. Finally we propose a new SA method which is more robust against leakage and against various attacks

    Key Management Building Blocks for Wireless Sensor Networks

    Get PDF
    Cryptography is the means to ensure data confidentiality, integrity and authentication in wireless sensor networks (WSNs). To use cryptography effectively however, the cryptographic keys need to be managed properly. First of all, the necessary keys need to be distributed to the nodes before the nodes are deployed in the field, in such a way that any two or more nodes that need to communicate securely can establish a session key. Then, the session keys need to be refreshed from time to time to prevent birthday attacks. Finally, in case any of the nodes is found to be compromised, the key ring of the compromised node needs to be revoked and some or all of the compromised keys might need to be replaced. These processes, together with the policies and techniques needed to support them, are called key management. The facts that WSNs (1) are generally not tamper-resistant; (2) operate unattended; (3) communicate in an open medium; (4) have no fixed infrastructure and pre-configured topology; (5) have severe hardware and resource constraints, present unique challenges to key management. In this article, we explore techniques for meeting these challenges. What distinguishes our approach from a routine literature survey is that, instead of comparing various known schemes, we set out to identify the basic cryptographic principles, or building blocks that will allow practitioners to set up their own key management framework using these building blocks

    KALwEN: a new practical and interoperable key management scheme for body sensor networks

    Get PDF
    Key management is the pillar of a security architecture. Body sensor networks (BSNs) pose several challenges–some inherited from wireless sensor networks (WSNs), some unique to themselves–that require a new key management scheme to be tailor-made. The challenge is taken on, and the result is KALwEN, a new parameterized key management scheme that combines the best-suited cryptographic techniques in a seamless framework. KALwEN is user-friendly in the sense that it requires no expert knowledge of a user, and instead only requires a user to follow a simple set of instructions when bootstrapping or extending a network. One of KALwEN's key features is that it allows sensor devices from different manufacturers, which expectedly do not have any pre-shared secret, to establish secure communications with each other. KALwEN is decentralized, such that it does not rely on the availability of a local processing unit (LPU). KALwEN supports secure global broadcast, local broadcast, and local (neighbor-to-neighbor) unicast, while preserving past key secrecy and future key secrecy (FKS). The fact that the cryptographic protocols of KALwEN have been formally verified also makes a convincing case. With both formal verification and experimental evaluation, our results should appeal to theorists and practitioners alike
    corecore