• Aucun résultat trouvé

Key management protocol

A scalable group key management protocol

A scalable group key management protocol

... group key management protocols are the Local Key Hierarchy (LKH) protocols presented by Wong et ...Group Key Management Protocol (GKMP) [3, 4] and Secure Lock [5], where n is the ...

5

Improving performance overhead of a trust-clustering key management protocol in ad hoc networks

Improving performance overhead of a trust-clustering key management protocol in ad hoc networks

... cryptography (ECC) became the choice of encryption for wireless ad hoc and sensor networks. It uses very small keys and is mathematically very effective, which makes them ideal in communication for small devices used ...

1

A new resilient key management protocol for wireless sensor networks

A new resilient key management protocol for wireless sensor networks

... is key management that covers the establishment, distribution, renewing and revocation of cryptographic ...Several key management protocols were proposed in the ...node’s key materials ...

15

Virtual Trials of the NICE-SUGAR Protocol: The Impact on Performance of Protocol and Protocol Compliance

Virtual Trials of the NICE-SUGAR Protocol: The Impact on Performance of Protocol and Protocol Compliance

... Glycaemic control protocols need to be both safe and effective for all patients, and be able to account for patient variability, before potential clinical benefits can be assessed (Penning et al., 2015, Chase et al., ...

6

Solid, non-skin, post-liver transplant tumors: Key role of lifestyle and immunosuppression management

Solid, non-skin, post-liver transplant tumors: Key role of lifestyle and immunosuppression management

... a key role, but recent data also implicate the role of calcineurin inhibitors, whose cumulative and dose-dependent effects on cell metabolism might play a direct role in ...Immunosuppressive protocol ...

10

Key factors of case management interventions for frequent users of healthcare services : a thematic analysis review

Key factors of case management interventions for frequent users of healthcare services : a thematic analysis review

... identify key factors of CM as a primary objective, corroborates and completes these results, by a rigorous thematic analysis of 13 empirical studies on the ...

9

Using sensitivity analyses to identify and optimize key parameters of sharka management strategy

Using sensitivity analyses to identify and optimize key parameters of sharka management strategy

... RESULTS First, we carried out generic sensitivity analyses with parameter ranges large enough to encompass values that are typical of many perennial plant diseases and of their management. These analyses revealed ...

2

Efficacy of self-management exercise program with spa therapy for behavioral management of knee osteoarthritis: research protocol for a quasi-randomized controlled trial (GEET one)

Efficacy of self-management exercise program with spa therapy for behavioral management of knee osteoarthritis: research protocol for a quasi-randomized controlled trial (GEET one)

... Methods: We aim to perform a prospective, multicentric, quasi-randomized controlled trial with an alternate-month design (1-month periods). People aged 50 –75 years old with symptomatic knee OA (stage I-IV Kellgren and ...

10

La Confiance, Variable-Clé d'un Contrôle Rénové / "Trust", a Key Variable in a New Approach of Management Control

La Confiance, Variable-Clé d'un Contrôle Rénové / "Trust", a Key Variable in a New Approach of Management Control

... L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignemen[r] ...

17

Developing a common Key performance indicators framework for biodiversity management in gypsum quarries throughout Europe for Eurogypsum

Developing a common Key performance indicators framework for biodiversity management in gypsum quarries throughout Europe for Eurogypsum

... on key concepts on indicators During the Focus Group, the Quarry WG agreed on the following: Simple indicators (or one-dimensional) will be preferred to composite ones, because they provide more information about ...

243

Data Location Management Protocol for Object Stores in a Fog Computing Infrastructure

Data Location Management Protocol for Object Stores in a Fog Computing Infrastructure

... new protocol relying on a tree and inspired by the DNS approach to store the location of ...our protocol, before discussing the overhead cost of our approach and the challenges to make our protocol ...

15

Trust management for public key infrastructures: implementing the X.509 trust broker

Trust management for public key infrastructures: implementing the X.509 trust broker

... Different programmes have been proposed to improve the current web TLS system (e.g., Certificate Transparency [14, 15], Sovereign Keys [16], and Public Key Pinning [17]). While those programmes prove the ...

25

The key role of animation in the execution of crisis management exercises

The key role of animation in the execution of crisis management exercises

... Crisis Management Proceedings of the 14th ISCRAM Conference – Albi, France, May 2017 Tina Comes, Frédérick Bénaben, Chihab Hanachi, Matthieu Lauras, Aurélie Montarnal, ...

13

Model-based identification and optimization of key parameters for sharka management strategy

Model-based identification and optimization of key parameters for sharka management strategy

... Using realistic parameter ranges given the present knowledge of sharka epidemiology, another sensitivity analysis on the most promising control parameters enabled the theoretical econ[r] ...

2

Energy management: A key driver of energy-efficiency investment? [ Catherine Cooremans  Alain Sch

Energy management: A key driver of energy-efficiency investment? [ Catherine Cooremans Alain Sch

... Energy management: A key driver of energy-efficiency ...a key driver of energy performance” is to better understand how large-scale energy consumer (LSEC) companies make energy-efficiency investment ...

1

Querying Key-Value Stores under Single-Key Constraints: Rewriting and Parallelization

Querying Key-Value Stores under Single-Key Constraints: Rewriting and Parallelization

... querying key-value stores in the presence of semantic constraints, expressed as rules on keys, whose pur- pose is to establish a high-level view over a collection of legacy ...the key-value store setting ...

9

Secure Time Synchronization Protocol

Secure Time Synchronization Protocol

... shared key k, the server may refuse to admit the provision of the time information that could have caused some damage to a ...the protocol uses public key operations only in the first two phases, the ...

7

Stress management in obesity during a thermal spa residential programme (ObesiStress): protocol for a randomised controlled trial study

Stress management in obesity during a thermal spa residential programme (ObesiStress): protocol for a randomised controlled trial study

... stress management programme and because the participants will be accompanied by health- care professionals, the adherence to treatment during a 1- year follow- up could be more ...

10

Controlled electromigration protocol revised

Controlled electromigration protocol revised

... of EM-based fabrication can be achieved by a successful revision of the EM protocol, instead of hardware redesign. An algorithm is proposed, which is particularly sensitive when the internal positive feedback of ...

8

Case management in primary care among frequent users of healthcare services with chronic conditions : protocol of a realist synthesis

Case management in primary care among frequent users of healthcare services with chronic conditions : protocol of a realist synthesis

... Data extraction and data analysis Data extraction and analysis will be done concurrently. The preliminary data extraction tool will be finalised with the input of the RS committee, piloted and revised as the review ...

8

Show all 4854 documents...

Sujets connexes