نتایج جستجو برای: پیاده سازی زیر ساخت امنیتی کلید عمومی pki و pki e

تعداد نتایج: 1775914  

Journal: :Inf. Sec. Techn. Report 2000
Chris J. Mitchell

This paper provides a review of the current state of the art in standards for Public Key Infrastructures. The main focus of the paper is the recent work by the Internet Engineering Task Force, ITU-T, and ISO/IEC.

2003
Antonio F. Gómez Skarmeta Gregorio Martínez Pérez Óscar Cánovas Reverte Gabriel López Millán

Generally speaking, a public key infrastructure (PKI) is a set of hardware, software, people, and procedures needed to create, manage, store, distribute, and revoke public key certificates. With these in place, a PKI can provide trusted and efficient privateand publickey certificate management, thus enabling the use of authentication, nonrepudiation, and confidential security services. To provi...

2007
Dimitrios Lekkas Dimitris Gritzalis

Millions of citizens around the world have already acquired their new electronic passport. The e-passport is equipped with contactless communication capability, as well as with a smart card processor enabling cryptographic functionality. Countries are required to build a Public Key Infrastructure to support digital signatures, as this is considered the basic tool to prove the authenticity and i...

Journal: :The Journal of pharmacology and experimental therapeutics 2013
Nadir Ulu Gemma M Mulder Peter Vavrinec Sjoerd W Landheer Basak Duman-Dalkilic Hakan Gurdal Maaike Goris Marry Duin Richard P E van Dokkum Hendrik Buikema Harry van Goor Robert H Henning

Transactivation of epidermal growth factor receptor (EGFR) signaling by G protein-coupled receptors has been implicated in several cardiovascular (CV) conditions, including hypertension, heart failure, and cardiac and vascular hypertrophy. However, the therapeutic potential of EGFR inhibition in these conditions is currently unknown. The main objective of the present study was to investigate ca...

Journal: :Computer Networks 2001
Peter Alterman

The goals of the U.S. Federal PKI are to create a cross-governmental, ubiquitous, interoperable Public Key Infrastructure and the development and use of applications which employ that PKI in support of Agency business processes. In addition, the U.S. Federal PKI must interoperate with State governments and with other national governments. Our goals recognize that the purpose of deploying a PKI ...

Journal: :Molecular cell 2009
Nobuhiko Kamoshita Akio Nomoto Uttam L RajBhandary

Translation initiation of the second ORF of insect dicistrovirus RNA depends on an internal ribosomal entry site (IRES) in its intergenic region (IGR) and is exceptional in using a codon other than AUG and in not using the canonical initiator methionine tRNA. Studies in vitro suggest that pseudoknot I (PKI) immediately preceding the initiation codon occupies the ribosomal P site and that an elo...

Journal: :Int. J. Found. Comput. Sci. 2007
Benjamin Aziz Geoff W. Hamilton

In this technical report, we present a process algebra aimed at modelling PKI-based systems. The new language, SPIKY, extends the spi-calculus by adding primitives for the retrieval of certified/uncertified public keys as well as private keys belonging to users of the PKI-based system. SPIKY also formalises the notion of process ownership by PKI users, which is necessary in controlling the sema...

Journal: :Cancer research 2002
Cheryl H Baker Carmen C Solorzano Isaiah J Fidler

We determined whether concurrent blockage of vascular endothelial growth factor (VEGF) receptor and epidermal growth factor (EGF) receptor signaling by two novel tyrosine kinase inhibitors, PTK 787 and PKI 166, respectively, can inhibit angiogenesis and, hence, the growth and metastasis of human pancreatic carcinoma in nude mice. Highly metastatic human pancreatic carcinoma L3.6pl cells were in...

2010
Vipul Goyal

With more and more acceptance of Digital Certificates and Public Key Infrastructures (PKI), the mechanisms to revoke a certificate in a PKI have recently received increasing attention. The revocation mechanisms are commonly classified into Certificate Revocation Lists (CRLs), trusted dictionaries and online mechanisms. The designer of a PKI should select an appropriate revocation method suiting...

Journal: :I. J. Network Security 2017
Mohammed Hassouna Bazara I. A. Barry Eihab B. M. Bashier

Despite the fact that the traditional public key infrastructure provides Level 3 trusted authority, but its two major problems of scalability and certificate management raised the need to an alternative security infrastructure. That motivated the appearance of new technologies to replace the traditional PKI, such as the Identity based encryption, the certificateless encryption, etc. But all tho...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید