نتایج جستجو برای: pki

تعداد نتایج: 1556  

Journal: :Molecular and cellular biology 2000
E A Gangolli M Belyamani S Muchinsky A Narula K A Burton G S McKnight M D Uhler R L Idzerda

Protein kinase inhibitor (PKI) is a potent endogenous inhibitor of the cyclic AMP (cAMP)-dependent protein kinase (PKA). It functions by binding the free catalytic (C) subunit with a high affinity and is also known to export nuclear C subunit to the cytoplasm. The significance of these actions with respect to PKI's physiological role is not well understood. To address this, we have generated by...

Journal: :CoRR 2003
Shinji Yamane Jiahong Wang Hironobu Suzuki Norihisa Segawa Yuko Murayama

OpenPGP, an IETF Proposed Standard based on PGP R © application, has its own Public Key Infrastructure (PKI) architecture which is different from the one based on X.509, another standard from ITU. This paper describes the OpenPGP PKI; the historical perspective as well as its current use. We also compare three PKI technologies standardized by IETF: OpenPGP, PKIX(X.509), and SPKI/SDSI. Since the...

2013
Audun Jøsang

A PKI can be described as a set of technologies, procedures and policies for propagating trust from where it initially exists to where it is needed for authentication in online environments. How the trust propagation takes place under a specific PKI depends on the PKI’s syntactic trust structure which is commonly known as a trust model. However, trust is primarily a semantic concept that can no...

2000
Grit Denker Jonathan Millen Yutaka Miyake

This survey covers basic information about public key infrastructures and summarizes the predominant technology and standards. Special attention is given to mechanisms for certificate revocation. Methods for CRL distribution and validity checking are compared. Supported by KDD R&D Laboratories, Inc.

2002
Shiuh-Pyng Shieh Shih-I Huang

The advantage of the ID-based authentication protocols over public-key based protocols is that authentication can be performed by simply knowing the identity of a party. Meanwhile, Public Key Infrastructure (PKI) provides a suite of excellent security and user management mechanisms that can be easily deployed to the Internet. In this paper, we present an ID-based proxy authentication protocol t...

2006
Jason E. Holt

We propose Surety Bond PKI, an alternative to high assurance certificates which increases cost disparity between fake and legitimate web sites.

2006
William T. Polk Kent Seamons

This paper presents two related activities, the first is the OASIS Digital Signature Services (DSS) standard, the second is the application of digital signatures to electronic invoicing as recognised under recent European legislation. DSS can be used to support a range of signature formats including the binary “cryptographic message syntax” and XML signatures, as well as related extended format...

Journal: :CoRR 2004
Adam J. Slagell Rafael Bonilla

We spend much of our time trying to communicate with each other. Wide-spread use of the Internet has increased the number of ways and the amount we communicate with each other. For example, we may now spend many hours per day simply writing and replying to e-mails. Like normal communication, there is information that can be publicly known (or at least we do not care if someone else knows it), a...

1998
Daniel J. Greenwood

Establishing trustworthiness requires an analysis of the business, technical and legal requirements for each party to a Public Key Infrastructure (PKI) based transaction. Much of the current discussion about PKI requirements revolves around the license, accreditation, or other sets of ratings as applied to certification authorities (CA). It is becoming apparent that an exclusive focus on CA qua...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید