A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Distribution characteristics and influencing factors of commercial center and hotspots based on big data: A case of the main urban area of Urumqi City
2020
地理科学进展
from the center to the peripheral area reduces progressively; and the distribution of the six types of commercial sites varies. ...
The findings of this study suggest that the key features of high-density commercial parcel distribution are central-peripheral, separated by highways and internal loops; the number of high value parcels ...
doi:10.18306/dlkxjz.2020.05.004
fatcat:vmx3h2t22nanbktlcw4nqliwnu
Distribution Network for the Last Mile of Cross-Border E-business in a Smart City at Emerging Market in Response to COVID-19: A Key Node Analysis Based on a Vision of Fourth Party Logistics
2021
Frontiers in Public Health
The key nodes in the distribution network of the last mile for cross-border E-business are further studied based on fourth-party logistics by a immune algorithm. ...
This research analyzes the distribution centers of distribution companies in Beijing city using fuzzy cluster analysis as a case study of smart cities. ...
based on key node analysis is further studied through a simulation based on plant growth. ...
doi:10.3389/fpubh.2021.765087
pmid:34708021
pmcid:PMC8542771
fatcat:slwzhd5c2jel5a7xtlbs2hgqmq
Secure and Lightweight Key Distribution with ZigBee Pro for Ubiquitous Sensor Networks
2013
International Journal of Distributed Sensor Networks
Despite high security mode, ZigBee Pro has weakness of key distribution. We use enhanced ECDH for secure key distribution in high security mode. ...
We also prove that the proposed key distribution can resist man-in-the-middle attack and replay attack. ...
Acknowledgments The work was supported by Ewha Global Top 5 Grant 2011 of Ewha Womans University and World Class University Program (R33-10085) through National Research Foundation of Korea funded by the ...
doi:10.1155/2013/608380
fatcat:6ojgwqy66vadbb6qptjw4kir4i
Cryptographic Software Solution for Information Protection in a Corporate Intranet
2000
Information & Security An International Journal
Software tools for KDMC Software tools for Key Distribution and Management Center include: a tool for definition of the architecture; a tool for definition of security applications and groups of keys ...
Crypto Keys Distribution and Management Center Crypto Keys Distribution and Management Center generates, distributes and manages keys and passwords. It is connected with GCS. ...
doi:10.11610/isij.0406
fatcat:pb7iui6ofbce5cozsltn4lngym
Managing data retention policies at scale
2011
12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops
The management service includes a highly available and secure encryption key store to manage the encryption keys of data objects. ...
The management service includes a highly available and secure encryption key store to manage the encryption keys of data objects. ...
Each key fragment is sent to one of n key distribution data centers, along with URI i . ...
doi:10.1109/inm.2011.5990674
dblp:conf/im/LiSSK11
fatcat:w65v5lzp7jec5oebgvp5grrjd4
A protocol for establishing secure communication channels in a large network
1994
IEEE Transactions on Knowledge and Data Engineering
Since data encryption/decryption requires sharing of a secret session key, finding an efficient way to distribute the session key in a large-scale, truly distributed network has been a nontrivial task. ...
We assume the target network consists of many locally trusted centers, and each center has many users attached to it. ...
This is advantageous because: a) for a truly distributed, large-scale network, such a KDC may not exist, and b) the security of a centralized key distribution scheme totally depends on the security of ...
doi:10.1109/69.273037
fatcat:garli7wmgndbtjgcm74f3cdxxq
Secure Key Establishment Mechanism for Smart Sensing System Based Robots Network
2020
Sensors
In this paper, we propose a new mechanism of key establishment based on high-order polynomials to ensure the safe key generation and key distribution. ...
Experiments show that the key establishment mechanism proposed in this paper guarantees the security of keys; its storage cost and communication cost are smaller than state-of-the-art mechanisms; and it ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/s20071970
pmid:32244647
fatcat:k674s4rxnjf3zhpc7ga63du5ze
Quantum key distribution with two-way authentication
2021
Optical and quantum electronics
In the process of key distribution, authentication is not considered, which is also a problem of quantum key distribution protocol. ...
In this paper, a quantum key distribution protocol with two-way authentication is proposed. Identity authentication is carried out at the same time of key distribution. ...
Improved key distribution agreement focused on the key sifting, because it determines the security of key distribution protocol, but also directly affect the production rate of the key. ...
doi:10.1007/s11082-021-02845-8
fatcat:4m4puskuvrbfrm6j5aylxyjhqu
Conference key distribution schemes for secure digital mobile communications
1995
IEEE Journal on Selected Areas in Communications
In these schemes, a group of users can generate a common secret key over a public channel so that they may hold a secure conference. ...
We present two new conference key distribution schemes for digital mobile communication systems. ...
ACKNOWLEDGMENT We would like to thank the nonymous referees for their many helpful comments and suggessions. ...
doi:10.1109/49.345886
fatcat:qat5hcvke5agfljl2mmk2mc474
Space requirements for broadcast encryption
[chapter]
1995
Lecture Notes in Computer Science
We obtain tight limitations both on the number of private keys associated with each user and on the number of keys generated by the center. ...
The feature of this scheme is to allow a central broadcast site to broadcast secure transmissions to an arbitrary set of recipients. ...
Then, we obtain tight limitations both on the number of private keys associated with each user and on the number of keys generated by the center. ...
doi:10.1007/bfb0053444
fatcat:mwdjtabvl5ccrkamf5gxqlmzie
Satellite Networks for Key Management
2007
2007 3rd International Conference on Recent Advances in Space Technologies
The cryptographic key management center is transformations the place where all the cryptographical protocols and T= -T(n) :1 < n < ci ...
The advantages of having a satellite network used as a
distributed key management center instead of utilizing a ...
The proposed system is a satellite network deployed one hence a distributed key management center which is stationed in space. TABLE I I classified by their employed key(s). ...
doi:10.1109/rast.2007.4283958
fatcat:nj7p4zwauzf6johdxcwfpy7h7q
An efficient ID-based Beta Cryptosystem
2015
International Journal of Security and Its Applications
In this way, if a user wants to communicate with others, he only needs to know the "identity" of his communication partner and the public key of the PKG. ...
Once a user is accepted, the PKG will provide him with a secret key. ...
Identity-based Key Distribution System An identity-based key distribution system is a key distribution system based on each user's identity and provides a powerful tool to share common keys in the large-scale ...
doi:10.14257/ijsia.2015.9.2.18
fatcat:eiress57ibdixmyrcgf4d3amn4
Cost of Content Services to Hybrid Computing
2016
Asia-pacific Journal of Convergent Research Interchange
Cost-minimizing migration of content distribution services into a hybrid cloud infrastructure that spans geographically distributed information centers. ...
contents to cloud storage, and to distribute their net service load to cloud-based net services. the most challenge is to form the most effective use of the cloud likewise as their existing on-premise ...
We even have a restricted time, as a train is feat in some minutes, that the close to best resolution is nice enough on behalf of us. ...
doi:10.21742/apjcri.2016.03.01
fatcat:crd2jdri7rccnbvqfimamrczma
A Group Key based Security Model for Big Data System
2016
International Journal of Security and Its Applications
Cluster membership authentication and message confidentiality is provided by using of the group key, and the key is efficiently updated by decentralized approach where the cluster is divided into several ...
In this paper a group key based security model for Cassandra is proposed. ...
An LKH scheme [14] , one of centralized approach, is applied to the subgroup and the seed node plays the role of key distribution center. ...
doi:10.14257/ijsia.2016.10.8.10
fatcat:ckyplhwjbrgddfcxibd5hfu43q
Dynamic Importance Analysis of Machining Center
2020
Journal of Electronic Research and Application
Therefore, the research on the importance of CNC machine tools is particularly important. ...
the fact, so the results can provide support for the importance research of machining center. ...
subsystem reliability model According to the data of a machining center, establish the reliability model of key components. ...
doi:10.26689/jera.v4i3.1271
fatcat:335e4ohd6jg3foqtnxrhgcwlfe
« Previous
Showing results 1 — 15 out of 1,989,002 results