首页 | 本学科首页   官方微博 | 高级检索  
     


Key derivation for network management applications
Authors:Blumenthal   U. Hien   N.C. Wijnen   B.
Affiliation:IBM Thomas J. Watson Res. Center, Yorktown Heights, NY;
Abstract:
This article describes a key derivation method that greatly simplifies key distribution issues for network management (NM) applications and may in some cases relieve NM stations from the need to store any keys at all. This method is easily generalized for network protocols and applications where several “masters” need to talk to a large number of “slaves”. It shows a way to cut down on the amount of keys stored with little impact on security. This is especially important when human users are involved
Keywords:
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号