نتایج جستجو برای: پیاده سازی زیر ساخت امنیتی کلید عمومی pki و pki e
تعداد نتایج: 1775914 فیلتر نتایج به سال:
In this paper we introduce an efficient approach for the secure PKI key generation on the idea of multiple modalities Iris and fingerprint. Contributions include a general approach for trivialities purpose generation, distinguishable iris feature generation and a PKI key generation mechanism. The image processing techniques are used to extract a biometric measurement from the fingerprint and ir...
Quantum computing technologies pose a significant threat to the currently employed public-key cryptography protocols. In this paper, we discuss impact of quantum on public key infrastructures (PKIs), which are used as part security systems for protecting production environments. We analyze issues existing models with focus requirements fast transition post-quantum solutions. Although our primar...
34 Published by the ieee ComPuter soCiety ■ 1540-7993/09/$25.00 © 2009 ieee ■ ieee seCurity & PrivaCy A public-key infrastructure is a collection of hardware, software, processes, and people that together provide security services based on public-key cryptography. Many countries, including Norway, Sweden, Denmark, Finland, Estonia, Austria, Belgium, and Canada, have introduced large-scale secur...
Ad hoc networks implemented with Jini technology permit users to enter a network, and become clients of services, without apriori knowledge of the network or its services. Although traditional Public Key Infrastructure (PKI) approaches to authentication are generally static, we employ PKI in a manner consistent with the dynamic nature of ad hoc networks. This paper presents an algorithm that pr...
Introduction Contrary to analysts’ forecasts we heard some years ago, PKI (public key infrastructure) has not become a widespread technology yet. An important reason for this is the insufficient usability PKI-enabled applications are often blamed for [11]. Users’ behavior has turned out to be the biggest risk in security software [10], so usability issues deserve closer attention. Research in t...
PURPOSE We determined whether blockade of the epidermal growth factor receptor (EGF-R) signaling pathway by oral administration of the EGF-R tyrosine kinase inhibitor (PKI 166) alone or in combination with injectable Taxol inhibits the growth of PC-3MM2 human prostate cancer cells in the bone of nude mice. EXPERIMENTAL DESIGN Male nude mice implanted with PC-3MM2 cells in the tibia were treat...
Transactivation of epidermal growth factor receptor (EGFR) signaling by G protein–coupled receptors has been implicated in several cardiovascular (CV) conditions, including hypertension, heart failure, and cardiac and vascular hypertrophy. However, the therapeutic potential of EGFR inhibition in these conditions is currently unknown. The main objective of the present study was to investigate ca...
While PKI applications differ in how they use keys, all applications share one assumption: users have keypairs. In previous work, we established that desktop keystores are not safe places to store private keys, because the TCB is too large. These keystores are also immobile, difficult to use, and make it impossible for relying parties to make reasonable trust judgments. Since we would like to u...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید