Mobility

The File Encryption Method in Cryptographic Key Management Wireless Ad Hoc Networks

Free registration required

Executive Summary

As distributed computing systems grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes increasingly important. Cryptographic techniques can play an important role in protecting communication links and file data, since access to data can be limited to those who hold the proper key. In the case of file data, however, the routine use of encryption facilities often places the organizational requirements of information security in opposition to those of information management.

  • Format: PDF
  • Size: 295.1 KB