نتایج جستجو برای: pki

تعداد نتایج: 1556  

Journal: :Computer Science and Application 2013

2005
Sean W. Smith

PKI researchers keep producing applications that use publickey cryptography to enable human users (and service providers) to make effective trust judgments across organizational boundaries. However, too often, when we look closely, these judgments are unfounded; a moderately malicious adversary can often defeat the system. This position paper posits that this problem is endemic to current effor...

1998
Xiaoyi Liu

This document defines the means by which PKI clients and servers may exchange PKI messages when using the Cryptographic Message Syntax [CMS] as a transaction envelope. It extends concepts established in the draft [CRS] version of this material by accommodating external specification of message bodies in the Certificate Management Message Formats [CMMF] and Certificate Request Message Format [CR...

Journal: :RFC 2007
Brian Korver

The Internet Key Exchange (IKE) and Public Key Infrastructure for X.509 (PKIX) certificate profile both provide frameworks that must be profiled for use in a given application. This document provides a profile of IKE and PKIX that defines the requirements for using PKI technology in the context of IKE/IPsec. The document complements protocol specifications such as IKEv1 and IKEv2, which assume ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده برق و کامپیوتر 1394

سیستمهای محاسباتی و تکنولوژیهای جدید با سرعت بالا و بصورت روزمره در حال رشد و تکامل جهت پاسخگویی به نیازهای انسان و زمینههای مختلف علمی، اقتصادی، تجاری، اجتماعی و... میباشند . این سیر تکاملی در ابعاد مختلفی صورت میگیرد. توان و قدرت محاسباتی و پردازش اطلاعات، ظرفیت ذخیره سازی آنها، در دسترس بودن منابع و... از ابعاد گوناگون این سیر تکاملی محسوب می شود. رایانش ابری یکی از جدیدترین روشهای محاسبا...

Journal: :IJCNS 2009
Johannes A. Buchmann Evangelos G. Karatsiolis

The Server-Based Certificate Validation Protocol allows PKI clients to delegate to a server the construction or validation of certification paths. The protocol’s specification focuses on the communication between the server and the client and its security. It does not discuss how the servers can efficiently locate the necessary PKI resources like certificate or certificate revocation lists. In ...

2004
Bernhard Esslinger

Early PKI projects fell short in getting the critical mass of users subscribed because they were too expensive and to ambigious. Now, beyond the hype, there is a demand for improvement of security step by step rather than for big projects. Now, linking up existing PKI-islands, using S/MIME, introducing single sign-on and rising awareness are hot topics. Our vision, however, remains a globally a...

2014
Shinjo Park Suwan Park Insu Yun Dongkwan Kim Yongdae Kim

This paper analyzes security of Korean USIM-based PKI certificate service. Korean PKI certificate consists of public key and password encrypted private key on disk. Due to insufficient security provided by single password, Korean mobile operators introduced USIM-based PKI system. We found several vulnerabilities inside the system, including private key’s RSA prime number leakage during certific...

2007
Jean Everson Martina Túlio Cicero Salvaro de Souza Ricardo Felipe Custódio

The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI. Relying parties need assurances that the private key used to sign their certificates is controlled and managed following pre-defined statement policy. Hardware Security Modules (HSM) offer physical and logical protection and should be considered for a...

2017
Maria Augusta Arruda Leigh A. Stoddart Karolina Gherbi Stephen J. Briddon Barrie Kellam Stephen J. Hill

Recent advances in fluorescent ligand technology have enabled the study of G protein-coupled receptors in their native environment without the need for genetic modification such as addition of N-terminal fluorescent or bioluminescent tags. Here, we have used a non-imaging plate reader (PHERAstar FS) to monitor the binding of fluorescent ligands to the human adenosine-A3 receptor (A3AR; CA200645...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید