نتایج جستجو برای: پیاده سازی زیر ساخت امنیتی کلید عمومی pki و pki e

تعداد نتایج: 1775914  

2012
A. Jaya Lakshmi

In this paper we introduce an efficient approach for the secure PKI key generation on the idea of multiple modalities Iris and fingerprint. Contributions include a general approach for trivialities purpose generation, distinguishable iris feature generation and a PKI key generation mechanism. The image processing techniques are used to extract a biometric measurement from the fingerprint and ir...

Journal: :EPJ Quantum Technology 2021

Quantum computing technologies pose a significant threat to the currently employed public-key cryptography protocols. In this paper, we discuss impact of quantum on public key infrastructures (PKIs), which are used as part security systems for protecting production environments. We analyze issues existing models with focus requirements fast transition post-quantum solutions. Although our primar...

2009

34 Published by the ieee ComPuter soCiety ■ 1540-7993/09/$25.00 © 2009 ieee ■ ieee seCurity & PrivaCy A public-key infrastructure is a collection of hardware, software, processes, and people that together provide security services based on public-key cryptography. Many countries, including Norway, Sweden, Denmark, Finland, Estonia, Austria, Belgium, and Canada, have introduced large-scale secur...

2003
D. M. Needham M. M. McMahon J. B. Datko

Ad hoc networks implemented with Jini technology permit users to enter a network, and become clients of services, without apriori knowledge of the network or its services. Although traditional Public Key Infrastructure (PKI) approaches to authentication are generally static, we employ PKI in a manner consistent with the dynamic nature of ad hoc networks. This paper presents an algorithm that pr...

2006
Tobias Straub

Introduction Contrary to analysts’ forecasts we heard some years ago, PKI (public key infrastructure) has not become a widespread technology yet. An important reason for this is the insufficient usability PKI-enabled applications are often blamed for [11]. Users’ behavior has turned out to be the biggest risk in security software [10], so usability issues deserve closer attention. Research in t...

Journal: :Clinical cancer research : an official journal of the American Association for Cancer Research 2003
Sun-Jin Kim Hisanori Uehara Takashi Karashima David L Shepherd Jerald J Killion Isaiah J Fidler

PURPOSE We determined whether blockade of the epidermal growth factor receptor (EGF-R) signaling pathway by oral administration of the EGF-R tyrosine kinase inhibitor (PKI 166) alone or in combination with injectable Taxol inhibits the growth of PC-3MM2 human prostate cancer cells in the bone of nude mice. EXPERIMENTAL DESIGN Male nude mice implanted with PC-3MM2 cells in the tibia were treat...

2013
Nadir Ulu Gemma M. Mulder Peter Vavrinec Sjoerd W. Landheer Basak Duman-Dalkilic Hakan Gurdal Maaike Goris Marry Duin Richard P. E. van Dokkum Hendrik Buikema Harry van Goor Robert H. Henning

Transactivation of epidermal growth factor receptor (EGFR) signaling by G protein–coupled receptors has been implicated in several cardiovascular (CV) conditions, including hypertension, heart failure, and cardiac and vascular hypertrophy. However, the therapeutic potential of EGFR inhibition in these conditions is currently unknown. The main objective of the present study was to investigate ca...

2005
John Marchesini Sean W. Smith

While PKI applications differ in how they use keys, all applications share one assumption: users have keypairs. In previous work, we established that desktop keystores are not safe places to store private keys, because the TCB is too large. These keystores are also immobile, difficult to use, and make it impossible for relying parties to make reasonable trust judgments. Since we would like to u...

Journal: :International Journal of Information Security 2004

Journal: :Jurnal Teknologi dan Sistem Komputer 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید