نتایج جستجو برای: pki

تعداد نتایج: 1556  

2004
Georgios Kambourakis Angelos N. Rouskas Stefanos Gritzalis

With a large number of different heterogeneous network technologies (e.g. UMTS, WLAN, HIPERLAN) and operators expected in the future mobile communications environment, that should frequently and seamlessly interwork with each other and a constantly increasing population of communication parties, capturing the full benefits of open channel key transfers and scaling public key methods requires Pu...

2006
Ki-Woong Park Sang-Seok Lim Hosung Song Kyu-Ho Park

This paper describes the issues and challenges in the design of a new PKI-based security infrastructure enhanced with single sign-on and delegation technology for a diminutive security device in a ubiquitous security environment. In order to provide the PKI-based ubiquitous security infrastructure in consideration of the issues, we propose a PKI-based single signon protocol that provides a user...

2012
A. Jaya Lakshmi Sai Kiran

In this paper we introduce an efficient approach for the secure PKI key generation on the idea of multiple modalities Iris and fingerprint. Contributions embrace a general approach for trivialities point generation, distinguishable iris feature generation and a PKI key generation mechanism. The image processing techniques are used to extract a biometric measurement from the fingerprint and iris...

2018
Taeho Lee Christos Pappas Pawel Szalachowski Adrian Perrig

Motivated by the weaknesses of today’s TLS public-key infrastructure (PKI), recent studies have proposed numerous enhancements to fortify the PKI ecosystem. Deploying one particular enhancement is no panacea, since each one solves only a subset of the problems. At the same time, the high deployment barrier makes the benefit-cost ratio tilt in the wrong direction, leading to disappointing adopti...

Journal: :Electr. Notes Theor. Comput. Sci. 2009
Ali Nasrat Haidar Ali E. Abdallah

One of the main aims of certificate based Public Key Infrastructure (PKI) is to provide authentication in distributed systems. Through its functions, PKI authentication can be viewed as a re-usable component that can be integrated with other systems to offer strong authentication, scalability, and mobility, particularly for large organizations. PKI has been used to describe authentication in va...

Journal: :Journal of Internet Services and Applications 2010

Journal: :International journal of Computer Networks & Communications 2018

2007
Evangelos G. Karatsiolis

A public key infrastructure (PKI) secures lots of applications and processes. These are for example the electronic commerce, email communication, access to computers and networks, or digital identities for use in e-Government or the health care sector. The various PKI based applications have different requirements. These depend on the security level, the number of participants, the software or ...

2007
Jens Jensen David Spence Matthew Viljoen

In this paper we describe work to expand the PKI for the UK National Grid Service (NGS), to integrate it with site authentication and improve usability. This work is complementary to the UK Shibboleth deployment. As the NGS grows to support wider and larger scientific communities, we investigate how we can improve usability by tying in Virtual Organisation management into the PKI framework.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید