Comparative Analysis of Master-Key and Interpretative Key Management (IKM) Frameworks

作者: Saman Shojae , Azizah Bt Abdul Manaf , Mazdak Zamani

DOI: 10.5772/35329

关键词:

摘要: The process of generating, distributing and revoking a cryptographic key is called management (Piper & Murphy, 2002; Fumy Landrock, 1993). Key very challenging area between cryptographers attackers, since finding keys approved techniques computationally impossible, attackers prefer to somehow breach the instead trying crack (Techateerawat Jennings, 2007).

参考文章(6)
Fred Piper, Sean Murphy, Cryptography: A Very Short Introduction ,(2002)
Saman Shojae Chaeikar, Hossein Rouhani Zeidanloo, Hamidreza Sabet Moghaddam, Node Based Interpretative Key Management Framework. Security and Management. pp. 204- 210 ,(2010)
Piya Techateerawat, Andrew Jennings, Analyzing the Key Distribution from Security Attacks in Wireless Sensor Springer, Dordrecht. pp. 353- 357 ,(2007) , 10.1007/978-1-4020-6266-7_63
Saman Shojae Chaeikar, Shukor Abd Razak, Shohreh Honarbakhsh, Hossein Rouhani Zeidanloo, Mazdak Zamani, Farhang Jaryani, Interpretative Key Management (IKM), A Novel Framework international conference on computer research and development. pp. 265- 269 ,(2010) , 10.1109/ICCRD.2010.54
W. Fumy, P. Landrock, Principles of key management IEEE Journal on Selected Areas in Communications. ,vol. 11, pp. 785- 793 ,(1993) , 10.1109/49.223881