نتایج جستجو برای: public

تعداد نتایج: 381305  

Journal: :مدیریت فرهنگ سازمانی 0
سعید مقدس پور کارشناس ارشد رشته مدیریت دولتی، دانشگاه تربیت مدرس حسن دانایی فرد دانشیار دانشکده مدیریت و اقتصاد دانشگاه تربیت مدرس اسدالله کردنائیج دانشیار دانشکده مدیریت و اقتصاد دانشگاه تربیت مدرس

publicpolicies are the functions of the political systems for the national sovereignty. governments govern national wills under public policies. if the legislative version of these public policies be provided upon the scientific and political considerations it still remains useless unless it could pass the implementation stage successfully. the implementation of the public policies is the main ...

Journal: :health scope 0
hossein ansari health promotion research center, zahedan university of medical sciences, zahedan, ir iran; health promotion research center, zahedan university of medical sciences, zahedan, ir iran. tel: +98-9126309480, fax: +98-5412425375

2004
Ben Soh Luke Sledziona

In the current business environment there is an ever growing view of the World Wide Web, commonly referred to as the Internet, as the new frontier for electronic commerce or ecommerce. As a result many businesses are developing applications and/or websites in order to conduct e-commerce on the Internet without properly considering the implications of the certification system that they are choos...

Journal: :Security and Communication Networks 2013
Soyoung Park Baber Aslam Damla Turgut Cliff Changchun Zou

—In this paper, we propose two certificate mechanisms for preventing the Sybil attack in a vehicular ad hoc network (VANET): the timestamp series approach and the temporary certificate approach. We focus on an early-stage VANET when the number of smart vehicles is only a small fraction of the vehicles on the road and the only infrastructure components available are the roadside units (RSUs). Un...

2000
Audun Jøsang Ingar Glenn Pedersen Dean Povey

All human co-operation is based on trust, meaning that we choose co-operation partners and make commitment decisions based on how much we trust the other party. Digital certificates and public-key infrastructures represent an attempt to mimic real-world human assessment of identity and trustworthiness in an automated and mechanical fashion, but present implementations are based on a very limite...

2002
Peter Hesse David Lemire

This paper discusses considerations for certificate issuing systems and certificate processing applications, and directory systems in environments that employ nonhierarchical public key infrastructures (PKIs). The observations and recommendations here, while applicable to almost any non-hierarchical PKI, are most relevant to situations where the establishment of interoperability among the PKIs ...

2005
Stephen Farrell José Kahan

Implementing X.509 based public-key infrastructure requires following a complex set of rules to establish if a public key certificate is valid. The XML Key Management Specification has been developed as one way in which the implementation burden can be reduced by moving some of this complexity from clients and onto a server. In this paper we give a brief overview of the XML key management speci...

Journal: :Journal of Computer Security 2010
Massimiliano Pala Sean W. Smith

Public key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a Public Key Infrastructure (PKI). PKIs have become a central asset for many organizations, due to distributed IT and users. Even though the usage of PKIs in closed and controlled environments is quite common, interoperability a...

Journal: :Int. J. Found. Comput. Sci. 2014
Jia Fan Yuliang Zheng Xiaohu Tang

The concept of signcryption, introduced to the public by Zheng [19], is a primitive that combines the functions of both digital signature and public key encryption. The efficiency of signcryption is higher than sequential composition of digital signature and public key encryption. Identity-based signcryption is a specific type of signcryption, in which each user’s public key can be a string ide...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید