Filters








1,080,664 Hits in 3.5 sec

Fundamentals of Innovation [chapter]

Angela Albu
2017 Key Issues for Management of Innovative Projects  
The management of the innovative projects needs a basic theoretical frame in which to find explanations of all fundamentals concepts.  ...  The chapter will present the main fundamentals concepts and prepare the reader for more complex approaches in the field of project management.  ...  Author details Angela Albu Address all correspondence to: angelaa@seap.usv.ro "Stefan cel Mare", University of Suceava, Romania Fundamentals of Innovation http://dx.doi.org/10.5772/intechopen.69005  ... 
doi:10.5772/intechopen.69005 fatcat:xke6x5xpyzdijo33i4do7t2nra

Manet key management via Mobile Ficlke Key protocol (MFK)

S Shahadan, K Farahah, A.F.A. Firdaus
2018 Journal of Fundamental and Applied Sciences  
However, there ar need to be done in this protocol predominantly towards improving the delay process of key transmission. Therefore, Mobile Fickle Key (MFK) protocol is proposed to solve the problem.  ...  SKiMPy protocol has been designed to send protected data with symmetric shared key in MANET.  ...  As a result, key management protocol has been created in order to overcome this problem.  ... 
doi:10.4314/jfas.v9i5s.53 fatcat:6qvh4jzqjba4zfnikcmrhx4igy

Key network management

Jukka Ojasalo
2004 Industrial Marketing Management  
A company may manage several Key Networks.  ...  and applying operational level methods for managing actors of the Key Network.  ...  Scanning and analyzing opportunities results in the goal and fundamental function of a Key Network, which can also be called the Key Network strategy.  ... 
doi:10.1016/j.indmarman.2003.10.009 fatcat:c6u47giu7nazjppkkzs7od3dhu

Key management for substations: Symmetric keys, public keys or no keys?

Shailendra Fuloria, Ross Anderson, Fernando Alvarez, Kevin McGrath
2011 2011 IEEE/PES Power Systems Conference and Exposition  
a new specification dedicated to key management.  ...  In this paper, we discuss symmetric-key and publickey protocols for key management in electricity transmission and distribution substations-both for communication within substations, and between substations  ...  key management use the lowest-cost mechanisms, namely symmetric-key cryptography as in section II or even section IIB.  ... 
doi:10.1109/psce.2011.5772622 fatcat:te2kfhfsmffvtezkkkdtokyusu

THE KEY CONSTITUENTS OF THE MANUFACTURING SUCCESS PERFORMED BY THE EASTERN WAY OF MANAGEMENT
КЛЮЧЕВЫЕ СОСТАВЛЯЮЩИЕ ПРОИЗВОДСТВЕННОГО УСПЕХА ВОСТОЧНОГО ТИПА УПРАВЛЕНИЯ

K.K. Fidarova, G.S. Pavlova, F.B. Verdikhanova
2020 Фундаментальные исследования (Fundamental Research)  
Keywords: lean production, kaizen system, a management model, waste types, instrumental management, moral management, economic indicators Восточный опыт управления производством привлекает внимание ключевых  ...  Following the Japanese concept of «instrumental management» (Toyota Production System), the concepts of lean production (Production System) and moral management (Dao Toyota) emerge into the world's economy  ... 
doi:10.17513/fr.42845 fatcat:xf4yjx3phzb3vh3pthwvow64be

Group Key Management Using Public Key Exchange

Babak Daghighi, Laiha Mat Kiah, Saeedeh Afkhami Rad
2013 Journal of clean energy technologies  
Group key management is one of main block in securing group communication.  ...  This work presents an overview of existing contributory group key management schemes which specifically employ public key exchange algorithms for generating traffic key among members of a group.  ...  One of fundamental challenges in designing secure and reliable group communication system is to manage a group key.  ... 
doi:10.7763/ijcte.2013.v5.801 fatcat:7dzjjxxovrdfvgjmbwcueeifuu

LTE key management analysis with session keys context

Dan Forsberg
2010 Computer Communications  
Handover key management in mobile wireless networks targets to minimize the effects of a possible key compromise in the access points.  ...  We have chosen to compare it with our session keys context concept to see what the strengths in both are to get some perspective for deployments that benefit from distributed key management.  ...  To avoid the key stream repetition a fundamental requirement is that with the same key one of the parameters must always be fresh.  ... 
doi:10.1016/j.comcom.2010.07.002 fatcat:j3ojm7g765d6hbsbonoebgbszm

From key account selling to key account management

Tony Millman, Kevin Wilson
1995 Journal of Marketing Practice: Applied Marketing Science  
to the broader requirements of key account management problematic.  ...  Recent interest in relationship marketing and customer retention has re-focused the attention of marketing academics and managers towards Key Account Management (KAM) systems as a means of operationalising  ...  Synergistic KAM At this advanced stage of maturity, key account management goes "beyond partnership" when there is a fundamental shift in attitude on the part of both buyer and seller and they come to  ... 
doi:10.1108/eum0000000003877 fatcat:pdmndibugzbblcvu4z5s7vz7we

Passwords Management via Split-Key

Kenneth Giuliani, V. Kumar Murty, Guangwu Xu
2016 Journal of Information Security  
This paper proposes a scheme for password management by storing password encryptions on a server. The method involves having the encryption key split into a share for the user and one for the server.  ...  The server's share shall be generated from the user's share and the encryption key. The security and trust are achieved by performing both encryption and decryption on the client side.  ...  Browser-based password managers have been one of the most popular choices for user authentication and password management.  ... 
doi:10.4236/jis.2016.73016 fatcat:jq47hcpcebhw7ee64xile2ifu4

On replacing cryptographic keys in hierarchical key management systems

Anne V.D.M. Kayem, Selim G. Akl, Patrick Martin
2008 Journal of Computer Security  
In order to support our argument in favor of adaptive security, we begin by presenting two cryptographic key management (CKM) schemes in which key updates affect only the class concerned or those in its  ...  However, Web application interactions raise issues pertaining to security and performance that make manual security management both time-consuming and challenging.  ...  Chapter 3 Efficient Key Management: Heuristics "Management must manage!" -Harold S.  ... 
doi:10.3233/jcs-2008-16303 fatcat:3usm2iiw5bevngv6sdhlem5tyq

KISS: "Key It Simple and Secure" Corporate Key Management [chapter]

Zongwei Zhou, Jun Han, Yue-Hsun Lin, Adrian Perrig, Virgil Gligor
2013 Lecture Notes in Computer Science  
Deploying a corporate key management system faces fundamental challenges, such as fine-grained key usage control and secure system administration.  ...  This paper presents a new key management architecture, called KISS, to enable comprehensive, trustworthy, user-verifiable, and cost-effective key management.  ...  Key Management Server (KISS Server).  ... 
doi:10.1007/978-3-642-38908-5_1 fatcat:qtmfikvt2bdprieszmb6eb3xha

Key research challenges in network management

A. Pras, J. Schonwalder, M. Burgess, O. Festor, G.M. Perez, R. Stadler, B. Stiller
2007 IEEE Communications Magazine  
Although network management has always played a key role for industry, it only recently received a similar level of attention from many research communities, accelerated by funding opportunities from new  ...  The workshop identified several topic areas, including management architectures, distributed real-time monitoring, data analysis and visualization, ontologies, economic aspects of management, uncertainty  ...  BEHAVIOR OF MANAGED SYSTEMS Management is fundamentally about deciding and delivering behavior. We want to model and manage the behaviors of hardware, software, and even users within a system.  ... 
doi:10.1109/mcom.2007.4342832 fatcat:6dtqzb3mnnax3drsdlvvaroex4

Key Management in Sensor Networks [chapter]

Guorui Li, Jingsha He, Yingfang Fu
2006 Lecture Notes in Computer Science  
The extensive simulation results show that the proposed architecture can significantly decrease the SAP and increase the security level of key management for mobile ad hoc networks.  ...  In a mobile network scenario, however, the probabilistic key management as described in [9] can lead to a SAP of one order of magnitude larger than the one in a static network due to node fabrication attacks  ...  Key Management in Sensor Networks Key Management in Sensor Networks  ... 
doi:10.1007/11814856_44 fatcat:gnh34klgjvdnnpnch5am6qssd4

The Key to Successful Industrial Management

A. Lincoln Filene
1919 The Annals of the American Academy of Political and Social Science  
The management which recognizes this axiom holds the key to unlimited success.  ...  The Key to Successful Industrial Management By A. LINCOLN FILENE Treasurer and General Manager, Wm. Filene Sons Company, Boston, Mass.  ... 
fatcat:orz7vytefreadjcgl42cfoklai

The Key to Successful Industrial Management

A. Lincoln Filene
1919 The Annals of the American Academy of Political and Social Science  
The management which recognizes this axiom holds the key to unlimited success.  ...  WE do not have to theorize as to what a modern plant and its ' ' management should stand for. The facts are ready to hand.  ...  The management which recognizes this axiom holds the key to unlimited success.  ... 
doi:10.1177/000271621908500103 fatcat:ari75og6zfenjoiuztamabspu4
« Previous Showing results 1 — 15 out of 1,080,664 results