Ważniejsze dane społeczno-gospodarcze o województwach
نویسندگان
چکیده
منابع مشابه
Measuring DANE TLSA Deployment
The DANE (DNS-based Authentication of Named Entities) framework uses DNSSEC to provide a source of trust, and with TLSA it can serve as a root of trust for TLS certificates. This serves to complement traditional certificate authentication methods, which is important given the risks inherent in trusting hundreds of organizations—risks already demonstrated with multiple compromises. The TLSA prot...
متن کاملPhotons and Other Physics @ Dane
On overview of the main physics objectives of the Frascati-factory DAANE is presented. Study of CP violation in the K-meson system, Chiral Perturbation Theory tests in K-meson decays, low energy measurement of the hadronic cross-secton and the physics potential of gamma gamma interactions are discussed. A brief discussion of the hypernuclei and kaonic atom experiments is also included.
متن کاملDANE Trusted Email for Supply Chain Management
Supply chain management is critically dependent on trusted email mechanisms that address forgery, confidentiality, and sender authenticity. The IETF protocol ‘Domain Authentication of Named Entities’ (DANE) described in this paper has been extended from its initial goal of providing TLS web site validation to also offer a foundation for globally scalable and interoperable email security. Widesp...
متن کاملDemonstration of subpopulations of Dane particles.
Two populations of Dane particles were isolated from the plasma of individuals carrying hepatitis B surface antigen. These populations had densities in CsCl of 1.22 and 1.20 g/ml. Endogenous DNA polymerase activity was found to be associated only with the heavier of these two populations. Using a positive stain, electron microscopic examination of these particles suggested that the heavier the ...
متن کاملReducing the X.509 Attack Surface with DNSSEC’s DANE
For the last decade, perhaps the most commonly used type of end-user security has been the HTTP Secure (HTTPS) protocol employed by web browsers (which runs over the Secure Sockets Layer, SSL or its successor, TLS). In HTTPS, any service (such as a website) may create its own cryptographic certificate to secure its communication channel, and clients use this certificate to verify data from, and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Śląski Przegląd Statystyczny
سال: 2018
ISSN: 1644-6739,2449-9765
DOI: 10.15611/sps.2018.16.11