نتایج جستجو برای: پیاده سازی زیر ساخت امنیتی کلید عمومی pki و pki e
تعداد نتایج: 1775914 فیلتر نتایج به سال:
Early PKI projects fell short in getting the critical mass of users subscribed because they were too expensive and to ambigious. Now, beyond the hype, there is a demand for improvement of security step by step rather than for big projects. Now, linking up existing PKI-islands, using S/MIME, introducing single sign-on and rising awareness are hot topics. Our vision, however, remains a globally a...
This paper analyzes security of Korean USIM-based PKI certificate service. Korean PKI certificate consists of public key and password encrypted private key on disk. Due to insufficient security provided by single password, Korean mobile operators introduced USIM-based PKI system. We found several vulnerabilities inside the system, including private key’s RSA prime number leakage during certific...
The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI. Relying parties need assurances that the private key used to sign their certificates is controlled and managed following pre-defined statement policy. Hardware Security Modules (HSM) offer physical and logical protection and should be considered for a...
Recent advances in fluorescent ligand technology have enabled the study of G protein-coupled receptors in their native environment without the need for genetic modification such as addition of N-terminal fluorescent or bioluminescent tags. Here, we have used a non-imaging plate reader (PHERAstar FS) to monitor the binding of fluorescent ligands to the human adenosine-A3 receptor (A3AR; CA200645...
With a large number of different heterogeneous network technologies (e.g. UMTS, WLAN, HIPERLAN) and operators expected in the future mobile communications environment, that should frequently and seamlessly interwork with each other and a constantly increasing population of communication parties, capturing the full benefits of open channel key transfers and scaling public key methods requires Pu...
This paper describes the issues and challenges in the design of a new PKI-based security infrastructure enhanced with single sign-on and delegation technology for a diminutive security device in a ubiquitous security environment. In order to provide the PKI-based ubiquitous security infrastructure in consideration of the issues, we propose a PKI-based single signon protocol that provides a user...
In this paper we introduce an efficient approach for the secure PKI key generation on the idea of multiple modalities Iris and fingerprint. Contributions embrace a general approach for trivialities point generation, distinguishable iris feature generation and a PKI key generation mechanism. The image processing techniques are used to extract a biometric measurement from the fingerprint and iris...
Blind signatures have key role in real world applications like e-cash, e-voting etc. The first blind signature was proposed by Chaum under public key infrastructure(PKI) model. The inherent problem in PKI is the certificate management which is overcome by identity(ID) based system. The ID based system is susceptible to key escrow problem. By removing the inherent problems of both PKI and ID bas...
Motivated by the weaknesses of today’s TLS public-key infrastructure (PKI), recent studies have proposed numerous enhancements to fortify the PKI ecosystem. Deploying one particular enhancement is no panacea, since each one solves only a subset of the problems. At the same time, the high deployment barrier makes the benefit-cost ratio tilt in the wrong direction, leading to disappointing adopti...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید