نتایج جستجو برای: molecular certificates
تعداد نتایج: 641525 فیلتر نتایج به سال:
System NP Hardness problem is addressed and Mathematical framework is proposed for certificates and enhancement of security systems KeywordsKey Management, Certificates, NP
The notion of undeniable signature schemes was proposed by Chaum and Antwerpen in order to provide the signer with the ability to control the privacy of her signatures. Undeniable signature schemes without certificates that have been proposed to this day are either in identity-based paradigm or certificateless paradigm. In this paper, we provide a complete review on the development course of un...
With the increasing acceptance of digital certificates, there has been a gaining impetus for methods to nullify the compromised digital certificates and enable the end user to receive this information before he trusts a revoked certificate. The problem of certificate revocation is getting more and more crucial with the development of wide spread PKIs. We discuss the need and importance of revoc...
Public-key cryptography is fast becoming the foundation for those applications that require security and authentication in open networks. But the widespread use of a global public-key cryptosystem requires that public-key certificates are always available and up-to-date. Problems associated to digital certificates management, like storage, retrieval, maintenance, and, specially, revocation, req...
Transport Layer Security (TLS) and its predecessor, SSL, are important cryptographic protocol suites on the Internet. They both implement public key certificates and rely on a group of trusted certificate authorities (i.e., CAs) for peer authentication. Unfortunately, the most recent research reveals that, if any one of the pre-trusted CAs is compromised, fake certificates can be issued to inte...
The Java Development Kit (JDK) has included the concepts of cryptographic keys, signatures and certificates since version 1.0, and they have been improved and extended in JDK 1.2. However, the certificate interfaces still only cover identity certificates. As more and more security software makes use of authorization certificates, we feel that the concept of an authorization certificate and its ...
The AVMA will likely comment on the proposed amendment, which is on the February meeting agenda for the Council on Veterinary Service. The Association's recently revised policy on acclimation certificates is available at www.avma.org/issues/policy. More on the certificates and the AVMA policy is online at www.avma.org/onlnews/javma/jan08/080115f.asp. Page 1 of 2 USDA proposes end to acclimation...
Deciding the equivalence of regular expressions is a fundamental problem of theoretical computer science. On one hand, there are several decision procedures to solve this problem. On the other hand, there are several axiomatisations of the equivalence of regular expression. The axiomatisations are proved to be complete and the proofs consists of showing that each steps of a decision procedure c...
Any large scale security architecture that uses certificates to provide security in a distributed system will need some automated support for moving certificates around in the network. We believe that for efficiency, this automated support should be tied closely to the consumer of the certificates: the policy verifier. As a proof of concept, we have built QCM, a prototype policy language and ve...
OBJECTIVE To determine the frequency of reporting of diabetes on death certificates of decedents with known diabetes, define factors associated with reporting of diabetes, and describe trends in reporting over time. RESEARCH DESIGN AND METHODS Data were obtained from 11,927 participants with diabetes who were enrolled in the Translating Research Into Action for Diabetes study, a multicenter p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید