A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Fundamentals of Innovation
[chapter]
2017
Key Issues for Management of Innovative Projects
The management of the innovative projects needs a basic theoretical frame in which to find explanations of all fundamentals concepts. ...
The chapter will present the main fundamentals concepts and prepare the reader for more complex approaches in the field of project management. ...
Author details
Angela Albu Address all correspondence to: angelaa@seap.usv.ro "Stefan cel Mare", University of Suceava, Romania Fundamentals of Innovation http://dx.doi.org/10.5772/intechopen.69005 ...
doi:10.5772/intechopen.69005
fatcat:xke6x5xpyzdijo33i4do7t2nra
Manet key management via Mobile Ficlke Key protocol (MFK)
2018
Journal of Fundamental and Applied Sciences
However, there ar need to be done in this protocol predominantly towards improving the delay process of key transmission. Therefore, Mobile Fickle Key (MFK) protocol is proposed to solve the problem. ...
SKiMPy protocol has been designed to send protected data with symmetric shared key in MANET. ...
As a result, key management protocol has been created in order to overcome this problem. ...
doi:10.4314/jfas.v9i5s.53
fatcat:6qvh4jzqjba4zfnikcmrhx4igy
Key network management
2004
Industrial Marketing Management
A company may manage several Key Networks. ...
and applying operational level methods for managing actors of the Key Network. ...
Scanning and analyzing opportunities results in the goal and fundamental function of a Key Network, which can also be called the Key Network strategy. ...
doi:10.1016/j.indmarman.2003.10.009
fatcat:c6u47giu7nazjppkkzs7od3dhu
Key management for substations: Symmetric keys, public keys or no keys?
2011
2011 IEEE/PES Power Systems Conference and Exposition
a new specification dedicated to key management. ...
In this paper, we discuss symmetric-key and publickey protocols for key management in electricity transmission and distribution substations-both for communication within substations, and between substations ...
key management use the lowest-cost mechanisms, namely symmetric-key cryptography as in section II or even section IIB. ...
doi:10.1109/psce.2011.5772622
fatcat:te2kfhfsmffvtezkkkdtokyusu
THE KEY CONSTITUENTS OF THE MANUFACTURING SUCCESS PERFORMED BY THE EASTERN WAY OF MANAGEMENT
КЛЮЧЕВЫЕ СОСТАВЛЯЮЩИЕ ПРОИЗВОДСТВЕННОГО УСПЕХА ВОСТОЧНОГО ТИПА УПРАВЛЕНИЯ
2020
Фундаментальные исследования (Fundamental Research)
КЛЮЧЕВЫЕ СОСТАВЛЯЮЩИЕ ПРОИЗВОДСТВЕННОГО УСПЕХА ВОСТОЧНОГО ТИПА УПРАВЛЕНИЯ
Keywords: lean production, kaizen system, a management model, waste types, instrumental management, moral management, economic indicators Восточный опыт управления производством привлекает внимание ключевых ...
Following the Japanese concept of «instrumental management» (Toyota Production System), the concepts of lean production (Production System) and moral management (Dao Toyota) emerge into the world's economy ...
doi:10.17513/fr.42845
fatcat:xf4yjx3phzb3vh3pthwvow64be
Group Key Management Using Public Key Exchange
2013
Journal of clean energy technologies
Group key management is one of main block in securing group communication. ...
This work presents an overview of existing contributory group key management schemes which specifically employ public key exchange algorithms for generating traffic key among members of a group. ...
One of fundamental challenges in designing secure and reliable group communication system is to manage a group key. ...
doi:10.7763/ijcte.2013.v5.801
fatcat:7dzjjxxovrdfvgjmbwcueeifuu
LTE key management analysis with session keys context
2010
Computer Communications
Handover key management in mobile wireless networks targets to minimize the effects of a possible key compromise in the access points. ...
We have chosen to compare it with our session keys context concept to see what the strengths in both are to get some perspective for deployments that benefit from distributed key management. ...
To avoid the key stream repetition a fundamental requirement is that with the same key one of the parameters must always be fresh. ...
doi:10.1016/j.comcom.2010.07.002
fatcat:j3ojm7g765d6hbsbonoebgbszm
From key account selling to key account management
1995
Journal of Marketing Practice: Applied Marketing Science
to the broader requirements of key account management problematic. ...
Recent interest in relationship marketing and customer retention has re-focused the attention of marketing academics and managers towards Key Account Management (KAM) systems as a means of operationalising ...
Synergistic KAM At this advanced stage of maturity, key account management goes "beyond partnership" when there is a fundamental shift in attitude on the part of both buyer and seller and they come to ...
doi:10.1108/eum0000000003877
fatcat:pdmndibugzbblcvu4z5s7vz7we
Passwords Management via Split-Key
2016
Journal of Information Security
This paper proposes a scheme for password management by storing password encryptions on a server. The method involves having the encryption key split into a share for the user and one for the server. ...
The server's share shall be generated from the user's share and the encryption key. The security and trust are achieved by performing both encryption and decryption on the client side. ...
Browser-based password managers have been one of the most popular choices for user authentication and password management. ...
doi:10.4236/jis.2016.73016
fatcat:jq47hcpcebhw7ee64xile2ifu4
On replacing cryptographic keys in hierarchical key management systems
2008
Journal of Computer Security
In order to support our argument in favor of adaptive security, we begin by presenting two cryptographic key management (CKM) schemes in which key updates affect only the class concerned or those in its ...
However, Web application interactions raise issues pertaining to security and performance that make manual security management both time-consuming and challenging. ...
Chapter 3 Efficient Key Management: Heuristics "Management must manage!" -Harold S. ...
doi:10.3233/jcs-2008-16303
fatcat:3usm2iiw5bevngv6sdhlem5tyq
KISS: "Key It Simple and Secure" Corporate Key Management
[chapter]
2013
Lecture Notes in Computer Science
Deploying a corporate key management system faces fundamental challenges, such as fine-grained key usage control and secure system administration. ...
This paper presents a new key management architecture, called KISS, to enable comprehensive, trustworthy, user-verifiable, and cost-effective key management. ...
Key Management Server (KISS Server). ...
doi:10.1007/978-3-642-38908-5_1
fatcat:qtmfikvt2bdprieszmb6eb3xha
Key research challenges in network management
2007
IEEE Communications Magazine
Although network management has always played a key role for industry, it only recently received a similar level of attention from many research communities, accelerated by funding opportunities from new ...
The workshop identified several topic areas, including management architectures, distributed real-time monitoring, data analysis and visualization, ontologies, economic aspects of management, uncertainty ...
BEHAVIOR OF MANAGED SYSTEMS Management is fundamentally about deciding and delivering behavior. We want to model and manage the behaviors of hardware, software, and even users within a system. ...
doi:10.1109/mcom.2007.4342832
fatcat:6dtqzb3mnnax3drsdlvvaroex4
Key Management in Sensor Networks
[chapter]
2006
Lecture Notes in Computer Science
The extensive simulation results show that the proposed architecture can significantly decrease the SAP and increase the security level of key management for mobile ad hoc networks. ...
In a mobile network scenario, however, the probabilistic key management as described in [9] can lead to a SAP of one order of magnitude larger than the one in a static network due to node fabrication attacks ...
Key Management in Sensor Networks
Key Management in Sensor Networks ...
doi:10.1007/11814856_44
fatcat:gnh34klgjvdnnpnch5am6qssd4
The Key to Successful Industrial Management
1919
The Annals of the American Academy of Political and Social Science
The management which recognizes this axiom holds the key to unlimited success. ...
The Key to Successful Industrial Management By A. LINCOLN FILENE Treasurer and General Manager, Wm. Filene Sons Company, Boston, Mass. ...
fatcat:orz7vytefreadjcgl42cfoklai
The Key to Successful Industrial Management
1919
The Annals of the American Academy of Political and Social Science
The management which recognizes this axiom holds the key to unlimited success. ...
WE do not have to theorize as to what a modern plant and its ' ' management should stand for. The facts are ready to hand. ...
The management which recognizes this axiom holds the key to unlimited success. ...
doi:10.1177/000271621908500103
fatcat:ari75og6zfenjoiuztamabspu4
« Previous
Showing results 1 — 15 out of 1,080,664 results