Filters








1,989,002 Hits in 8.3 sec

Distribution characteristics and influencing factors of commercial center and hotspots based on big data: A case of the main urban area of Urumqi City

Hongxing CHEN, Degang YANG, Jiangyue LI, Rongwei WU, Jinwei HUO, 1. State Key Laboratory of Desert and Oasis Ecology, Xinjiang Institute of Ecology and Geography, CAS, Urumqi 830011, China2. University of Chinese Academy of Sciences, Beijing 100049, China
2020 地理科学进展  
from the center to the peripheral area reduces progressively; and the distribution of the six types of commercial sites varies.  ...  The findings of this study suggest that the key features of high-density commercial parcel distribution are central-peripheral, separated by highways and internal loops; the number of high value parcels  ... 
doi:10.18306/dlkxjz.2020.05.004 fatcat:vmx3h2t22nanbktlcw4nqliwnu

Distribution Network for the Last Mile of Cross-Border E-business in a Smart City at Emerging Market in Response to COVID-19: A Key Node Analysis Based on a Vision of Fourth Party Logistics

Da Huo, Xiaotao Zhang, Yinghui Cai, Ken Hung
2021 Frontiers in Public Health  
The key nodes in the distribution network of the last mile for cross-border E-business are further studied based on fourth-party logistics by a immune algorithm.  ...  This research analyzes the distribution centers of distribution companies in Beijing city using fuzzy cluster analysis as a case study of smart cities.  ...  based on key node analysis is further studied through a simulation based on plant growth.  ... 
doi:10.3389/fpubh.2021.765087 pmid:34708021 pmcid:PMC8542771 fatcat:slwzhd5c2jel5a7xtlbs2hgqmq

Secure and Lightweight Key Distribution with ZigBee Pro for Ubiquitous Sensor Networks

Kyung Choi, Mihui Kim, Kijoon Chae
2013 International Journal of Distributed Sensor Networks  
Despite high security mode, ZigBee Pro has weakness of key distribution. We use enhanced ECDH for secure key distribution in high security mode.  ...  We also prove that the proposed key distribution can resist man-in-the-middle attack and replay attack.  ...  Acknowledgments The work was supported by Ewha Global Top 5 Grant 2011 of Ewha Womans University and World Class University Program (R33-10085) through National Research Foundation of Korea funded by the  ... 
doi:10.1155/2013/608380 fatcat:6ojgwqy66vadbb6qptjw4kir4i

Cryptographic Software Solution for Information Protection in a Corporate Intranet

Veselin Tselkov
2000 Information & Security An International Journal  
Software tools for KDMC Software tools for Key Distribution and Management Center include:  a tool for definition of the architecture;  a tool for definition of security applications and groups of keys  ...  Crypto Keys Distribution and Management Center Crypto Keys Distribution and Management Center generates, distributes and manages keys and passwords. It is connected with GCS.  ... 
doi:10.11610/isij.0406 fatcat:pb7iui6ofbce5cozsltn4lngym

Managing data retention policies at scale

Jun Li, Sharad Singhal, Ram Swaminathan, Alan H. Karp
2011 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops  
The management service includes a highly available and secure encryption key store to manage the encryption keys of data objects.  ...  The management service includes a highly available and secure encryption key store to manage the encryption keys of data objects.  ...  Each key fragment is sent to one of n key distribution data centers, along with URI i .  ... 
doi:10.1109/inm.2011.5990674 dblp:conf/im/LiSSK11 fatcat:w65v5lzp7jec5oebgvp5grrjd4

A protocol for establishing secure communication channels in a large network

L. Harn, D. Huang
1994 IEEE Transactions on Knowledge and Data Engineering  
Since data encryption/decryption requires sharing of a secret session key, finding an efficient way to distribute the session key in a large-scale, truly distributed network has been a nontrivial task.  ...  We assume the target network consists of many locally trusted centers, and each center has many users attached to it.  ...  This is advantageous because: a) for a truly distributed, large-scale network, such a KDC may not exist, and b) the security of a centralized key distribution scheme totally depends on the security of  ... 
doi:10.1109/69.273037 fatcat:garli7wmgndbtjgcm74f3cdxxq

Secure Key Establishment Mechanism for Smart Sensing System Based Robots Network

Qi Xiao, Yunchuan Qin, Cheng Xu, Kenli Li
2020 Sensors  
In this paper, we propose a new mechanism of key establishment based on high-order polynomials to ensure the safe key generation and key distribution.  ...  Experiments show that the key establishment mechanism proposed in this paper guarantees the security of keys; its storage cost and communication cost are smaller than state-of-the-art mechanisms; and it  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s20071970 pmid:32244647 fatcat:k674s4rxnjf3zhpc7ga63du5ze

Quantum key distribution with two-way authentication

Xiaobo Zheng, Zhiwen Zhao
2021 Optical and quantum electronics  
In the process of key distribution, authentication is not considered, which is also a problem of quantum key distribution protocol.  ...  In this paper, a quantum key distribution protocol with two-way authentication is proposed. Identity authentication is carried out at the same time of key distribution.  ...  Improved key distribution agreement focused on the key sifting, because it determines the security of key distribution protocol, but also directly affect the production rate of the key.  ... 
doi:10.1007/s11082-021-02845-8 fatcat:4m4puskuvrbfrm6j5aylxyjhqu

Conference key distribution schemes for secure digital mobile communications

Min-Shiang Hwang, Wei-Pan Yang
1995 IEEE Journal on Selected Areas in Communications  
In these schemes, a group of users can generate a common secret key over a public channel so that they may hold a secure conference.  ...  We present two new conference key distribution schemes for digital mobile communication systems.  ...  ACKNOWLEDGMENT We would like to thank the nonymous referees for their many helpful comments and suggessions.  ... 
doi:10.1109/49.345886 fatcat:qat5hcvke5agfljl2mmk2mc474

Space requirements for broadcast encryption [chapter]

Carlo Blundo, Antonella Cresti
1995 Lecture Notes in Computer Science  
We obtain tight limitations both on the number of private keys associated with each user and on the number of keys generated by the center.  ...  The feature of this scheme is to allow a central broadcast site to broadcast secure transmissions to an arbitrary set of recipients.  ...  Then, we obtain tight limitations both on the number of private keys associated with each user and on the number of keys generated by the center.  ... 
doi:10.1007/bfb0053444 fatcat:mwdjtabvl5ccrkamf5gxqlmzie

Satellite Networks for Key Management

A. Koltuksuz
2007 2007 3rd International Conference on Recent Advances in Space Technologies  
The cryptographic key management center is transformations the place where all the cryptographical protocols and T= -T(n) :1 < n < ci  ...  The advantages of having a satellite network used as a distributed key management center instead of utilizing a  ...  The proposed system is a satellite network deployed one hence a distributed key management center which is stationed in space. TABLE I I classified by their employed key(s).  ... 
doi:10.1109/rast.2007.4283958 fatcat:nj7p4zwauzf6johdxcwfpy7h7q

An efficient ID-based Beta Cryptosystem

Chandrashekhar Meshram
2015 International Journal of Security and Its Applications  
In this way, if a user wants to communicate with others, he only needs to know the "identity" of his communication partner and the public key of the PKG.  ...  Once a user is accepted, the PKG will provide him with a secret key.  ...  Identity-based Key Distribution System An identity-based key distribution system is a key distribution system based on each user's identity and provides a powerful tool to share common keys in the large-scale  ... 
doi:10.14257/ijsia.2015.9.2.18 fatcat:eiress57ibdixmyrcgf4d3amn4

Cost of Content Services to Hybrid Computing

Dong Hyun Youm
2016 Asia-pacific Journal of Convergent Research Interchange  
Cost-minimizing migration of content distribution services into a hybrid cloud infrastructure that spans geographically distributed information centers.  ...  contents to cloud storage, and to distribute their net service load to cloud-based net services. the most challenge is to form the most effective use of the cloud likewise as their existing on-premise  ...  We even have a restricted time, as a train is feat in some minutes, that the close to best resolution is nice enough on behalf of us.  ... 
doi:10.21742/apjcri.2016.03.01 fatcat:crd2jdri7rccnbvqfimamrczma

A Group Key based Security Model for Big Data System

Heeyoul Kim
2016 International Journal of Security and Its Applications  
Cluster membership authentication and message confidentiality is provided by using of the group key, and the key is efficiently updated by decentralized approach where the cluster is divided into several  ...  In this paper a group key based security model for Cassandra is proposed.  ...  An LKH scheme [14] , one of centralized approach, is applied to the subgroup and the seed node plays the role of key distribution center.  ... 
doi:10.14257/ijsia.2016.10.8.10 fatcat:ckyplhwjbrgddfcxibd5hfu43q

Dynamic Importance Analysis of Machining Center

Weihao Liu
2020 Journal of Electronic Research and Application  
Therefore, the research on the importance of CNC machine tools is particularly important.  ...  the fact, so the results can provide support for the importance research of machining center.  ...  subsystem reliability model According to the data of a machining center, establish the reliability model of key components.  ... 
doi:10.26689/jera.v4i3.1271 fatcat:335e4ohd6jg3foqtnxrhgcwlfe
« Previous Showing results 1 — 15 out of 1,989,002 results