Keywords: مدیریت کلیدی; Security; Authentication; Signature; One-time password; PKI; Financial institution; Bank; Non-repudiation; Key management; Security protocols; Data integrity; Entropy; Consequential evidence
مقالات ISI ترجمه شده مدیریت کلیدی
مقالات ISI مدیریت کلیدی (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: مدیریت کلیدی; Data deduplication; Message-locked encryption; Key management; Access control; Cloud storage;
Keywords: مدیریت کلیدی; Access control; Authentication; Identity management; IoT; Key management; Security; Privacy; Sensing devices;
Keywords: مدیریت کلیدی; Authentication; key management; Body area sensor networks; Formal security; NS2 simulation;
Keywords: مدیریت کلیدی; Spectrum sensing; Key management; Cognitive radio network; Eavesdropping; Spectrum sensing data falsification;
Keywords: مدیریت کلیدی; Key generation; System of equations; Key connectivity; Key management; Wireless sensor networks;
Keywords: مدیریت کلیدی; Body Area Networks; Security; Key management; IEEE 802.15.6; Biometric;
Keywords: مدیریت کلیدی; Key management; Key distribution; Multicast security; Broadcast encryption; Self-healing;
Keywords: مدیریت کلیدی; Key pre-distribution; Key management; Multi-phase wireless sensor networks; Generation keys; Self-healing
Keywords: مدیریت کلیدی; Delay tolerant network; Autonomous; Key management; Key revocation; Trust; Reputation
Keywords: مدیریت کلیدی; Group key management; Key management; Secure group communication; Host mobility; Wireless
Keywords: مدیریت کلیدی; E-health; Internet of Things (IoT); Confidentiality; Security; Privacy; Key management
Keywords: مدیریت کلیدی; Security; Key management; Internet of Things; Wireless sensor network; Cryptographic primitives
Keywords: مدیریت کلیدی; Group key management; Key management; Secure group communication; Host mobility; Wireless
Keywords: مدیریت کلیدی; Security; Routing; Network management; Authentication; Key management; Adjacency management
Keywords: مدیریت کلیدی; Key management; Mobile agent; Elliptic curve; Migration; Mobile computing; MANET
Keywords: مدیریت کلیدی; Access control; Key management; Hierarchy; Hash function; Symmetric-key cryptosystem; Security
Keywords: مدیریت کلیدی; Fog computing; Key management; Authentication; Services; Security; AVISPA; NS2 simulation;
LiReK: A lightweight and real-time key establishment scheme for wearable embedded devices by gestures or motions
Keywords: مدیریت کلیدی; Lightweight; Key management; Real-time; Body sensor networks; Embedded devices;
Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context
Keywords: مدیریت کلیدی; Physical-context security; Key management; Device pairing; Proof-of-proximity; Relay attack;
ADS-Bsec: A novel framework to secure ADS-B
Keywords: مدیریت کلیدی; ADS-B; Integrity; Authenticity; Key management; NextGen;
Information attacks and security in wireless sensor networks of industrial SCADA systems
Keywords: مدیریت کلیدی; Information security; SCADA system; Wireless sensor network; Network attacks; Attacks detection; Intrusion detection system; Key management; Data encryption; Routing protocol;
Supporting dynamic updates in storage clouds with the Akl-Taylor scheme
Keywords: مدیریت کلیدی; Access control; Key assignment; Dynamic updates; Key management; Cloud storage;
SNVC: Social networks for vehicular certification
Keywords: مدیریت کلیدی; Social networks; Certificates; Vehicular networks; DTN security; Key management;
4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks
Keywords: مدیریت کلیدی; Key management; Cloud-assisted WBAN; Mobile attack; Security; Privacy; M-healthcare social network
A HIPAA-compliant key management scheme with revocation of authorization
Keywords: مدیریت کلیدی; Health Insurance and Accountability Act (HIPAA); Key management; Cryptography; Revocation;
Lightweight decentralized multicast-unicast key management method in wireless IPv6 networks
Keywords: مدیریت کلیدی; Key management; Security; Multicast IPv6; Multicast test-bed;
A generic security API for symmetric key management on cryptographic devices
Keywords: مدیریت کلیدی; Security APIs; Key management; PKCS#11; Cryptographic devices
Secure SCADA communication by using a modified key management scheme
Keywords: مدیریت کلیدی; Power system security; SCADA networks; Key management; Symmetric encryption; Cryptography;
A key management and secure routing integrated framework for Mobile Ad-hoc Networks
Keywords: مدیریت کلیدی; Key management; Secure routing; Mobile Ad hoc Networks;
Large scale wireless sensor networks with multi-level dynamic key management scheme
Keywords: مدیریت کلیدی; Cyber-physical systems; WSN; Security; Key management
One-way hash chain-based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networks
Keywords: مدیریت کلیدی; Wireless sensor networks; Key management; Group key distribution; Self-healing; Collusion attack
A new class of Hash-Chain based key pre-distribution schemes for WSN
Keywords: مدیریت کلیدی; Wireless sensor networks; Security; Key management; Resilience
Establishing initial trust in autonomous Delay Tolerant Networks without centralised PKI
Keywords: مدیریت کلیدی; Delay Tolerant Network; Autonomous; Key management; Trust; Reputation
Efficient authentication for fast handover in wireless mesh networks
Keywords: مدیریت کلیدی; Wireless mesh networks; Network security; Authentication; Mobile devices; Hand-over; Hand-off; Key management; Privacy
Towards enhanced key management in multi-phase ZigBee network architecture
Keywords: مدیریت کلیدی; Key management; ZigBee specification; Wireless sensor networks (WSNs)
Selecting key management schemes for WSN applications
Keywords: مدیریت کلیدی; Sensor networks; Key management; Network design; Optimization; Security
An efficient key management scheme for content access control for linear hierarchies
Keywords: مدیریت کلیدی; Content access control; Group communication; Key management; Linear hierarchies; Network security
Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem
Keywords: مدیریت کلیدی; Key management; Elliptic curve; Hierarchical access control; Polynomial interpolation; Security; Exterior root finding attacks
An efficient location-based compromise-tolerant key management scheme for sensor networks
Keywords: مدیریت کلیدی; Cryptography; Wireless sensor networks; Security in digital systems; Key management; Location
Secure key management scheme for dynamic hierarchical access control based on ECC
Keywords: مدیریت کلیدی; Key management; Key assignment; Elliptic curve; Hierarchical access control
A clique-based secure admission control scheme for mobile ad hoc networks (MANETs)
Keywords: مدیریت کلیدی; Mobile ad hoc networks (MANETs); Key management; Pairing-based cryptography
An efficient key assignment scheme for access control in a large leaf class hierarchy
Keywords: مدیریت کلیدی; Access control; Cryptography; Data security; Hierarchy; Key management
Proxy encryption based secure multicast in wireless mesh networks
Keywords: مدیریت کلیدی; Secure multicast; Proxy encryption; Key management; Wireless mesh networks
A high performance and intrinsically secure key establishment protocol for wireless sensor networks
Keywords: مدیریت کلیدی; Wireless sensor networks; Key management; Network security; Random key pre-distribution; Symmetric polynomials; Deployment knowledge
Analysis of Handover Key Management schemes under IETF perspective
Keywords: مدیریت کلیدی; EAP; Handover keying; Network access control; Key management; Security
Two-way Handshake protocol for improved security in IEEE 802.11 wireless LANs
Keywords: مدیریت کلیدی; 802.11; Handover; Authentication; Key management; Handshake protocol
An efficient date-constraint hierarchical key management scheme for mobile agents
Keywords: مدیریت کلیدی; Access control; Key management; Mobile agent; Elliptic curve cryptosystem; Date-constraint key management
LTE key management analysis with session keys context
Keywords: مدیریت کلیدی; LTE security; Key management; Handovers; Session keys context; Key separation
Efficient utilization of elliptic curve cryptosystem for hierarchical access control
Keywords: مدیریت کلیدی; Key management; Elliptic curve cryptosystems; Access control; User hierarchy; Security