نتایج جستجو برای: پیاده سازی زیر ساخت امنیتی کلید عمومی pki و pki e

تعداد نتایج: 1775914  

Journal: :Journal of Computer Security 2014

Journal: :Computer Science and Application 2013

Journal: :Journal of Computer Security 2010
Dimitrios Lekkas Dimitris Gritzalis

Millions of citizens around the world have already acquired their new electronic passport. The e-passport is equipped with contactless communication capability, as well as with an Integrated Circuit Chip enabling cryptographic functionality. Countries are required to build a national Public Key Infrastructure to support digital signatures, as this is considered the basic mechanism to prove the ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان - دانشکده فنی و مهندسی 1390

سلامت الکترونیک (e-health) عرصه جدیدی است بین اطلاع رسانی پزشکی، سلامت عمومی که به خدمات رسانی، توزیع و شفاف سازی اطلاعات بهداشتی و پزشکی از طریق فناوری اطلاعات توجه دارد. به عبارت دیگر، این مفهوم نه تنها پیشرفت فناوری را در بر می گیرد، بلکه نوع خاصی از تفکر و ذهنیت فراگیر و شبکه ای را برای پیشبرد مراقبت های سلامت با استفاده از فناوری های ارتباطی و اطلاعاتی ارائه می دهد. یک سیستم سلامت الکترونی...

2005
Sean W. Smith

PKI researchers keep producing applications that use publickey cryptography to enable human users (and service providers) to make effective trust judgments across organizational boundaries. However, too often, when we look closely, these judgments are unfounded; a moderately malicious adversary can often defeat the system. This position paper posits that this problem is endemic to current effor...

1998
Xiaoyi Liu

This document defines the means by which PKI clients and servers may exchange PKI messages when using the Cryptographic Message Syntax [CMS] as a transaction envelope. It extends concepts established in the draft [CRS] version of this material by accommodating external specification of message bodies in the Certificate Management Message Formats [CMMF] and Certificate Request Message Format [CR...

Journal: :RFC 2007
Brian Korver

The Internet Key Exchange (IKE) and Public Key Infrastructure for X.509 (PKIX) certificate profile both provide frameworks that must be profiled for use in a given application. This document provides a profile of IKE and PKIX that defines the requirements for using PKI technology in the context of IKE/IPsec. The document complements protocol specifications such as IKEv1 and IKEv2, which assume ...

2013
Pita Jarupunphol Wipawan Buathong

Visa 3-D Secure is an e-payment system based on the integration of SSL/TLS with the three-domain architecture. It employs cryptographic techniques to secure communication links among participants in e-commerce transactions and also provides credit card verification via Visa Secure Server. Although several security vulnerabilities can be addressed, spoofing attacks are still effective and can be...

2004
T. TSIAKIS

E-businesses are searching for ways to provide both cost effective and secure communication services. Internet, which is the primary medium for conducting e-business, is by its nature, an open, heterogeneous, non secure medium. Reports show that the ellipsis of trust in transaction security is the major reason why consumers are dubious to shop online and in expansion, unwilling to adopt an elec...

Journal: :IJCNS 2009
Johannes A. Buchmann Evangelos G. Karatsiolis

The Server-Based Certificate Validation Protocol allows PKI clients to delegate to a server the construction or validation of certification paths. The protocol’s specification focuses on the communication between the server and the client and its security. It does not discuss how the servers can efficiently locate the necessary PKI resources like certificate or certificate revocation lists. In ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید