Preserving Public Key Hierarchy
نویسنده
چکیده
91.3 Separation of Hierarchies................................................... 1178 91.4 Walk-Through of Issuance of a Certificate Containing a CSDT............................................................ 1179 91.5 Recovery Walk-Through .................................................... 1180 91.6 Known Issues ...................................................................... 1180 91.7 Summary ............................................................................. 1181 Bibliography...................................................................................... 1181
منابع مشابه
Memory Performance of Public-Key Cryptography Methods in Mobile Environments
As an increasing number of Internet hosts are wireless, handheld devices with small memory and strict CPU-latency constraints, the performance of cryptography methods has become critical for high transaction throughput. Elliptic Curve Cryptography (ECC) is emerging as an attractive public-key system for constrained environments, because of the small key sizes and computational efficiency, while...
متن کاملSelecting Hospital\'s Key Performance Indicators, Using Analytic Hierarchy Process Technique
Introduction: hospitals performance indicators will help monitoring, evaluation and decision making and therefore must be selected and ranked accurately. The aim of present study is identifying and selecting key hospitals performance indicators. Materials and methods: This is a descriptive and mixed (quantitative-qualitative) study. literature review and expert panel has been done to identif...
متن کاملAn Efficient, Dynamic and Trust Preserving Public Key Infrastructure
Nested certification is a methodology for efficient certificate path verification. Nested certificates can be used together with classical certificates in the Public Key Infrastructures (PKIs). Such a PKI, which is called Nested certificate based PKI (NPKI), is proposed in this paper as alternative to classical PKI. The NPKI formation model is a transition from an existing PKI by issuing nested...
متن کاملPrivacy-Preserving Electrocardiogram Monitoring for Intelligent Arrhythmia Detection †
Long-term electrocardiogram (ECG) monitoring, as a representative application of cyber-physical systems, facilitates the early detection of arrhythmia. A considerable number of previous studies has explored monitoring techniques and the automated analysis of sensing data. However, ensuring patient privacy or confidentiality has not been a primary concern in ECG monitoring. First, we propose an ...
متن کاملA Dynamic Key Generation Scheme for Access Control in a Hierarchy
In this paper, we propose a new dynamic cryptographic key generation scheme for access control in a hierarchy. Our method can achieve the following three goals. First, the storage space needed to store public information is smaller than that required in the previous work. Second, when a security class is added to the hierarchy, we assign a secret key and a public derivation key to the security ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007