نتایج جستجو برای: public
تعداد نتایج: 381305 فیلتر نتایج به سال:
publicpolicies are the functions of the political systems for the national sovereignty. governments govern national wills under public policies. if the legislative version of these public policies be provided upon the scientific and political considerations it still remains useless unless it could pass the implementation stage successfully. the implementation of the public policies is the main ...
In the current business environment there is an ever growing view of the World Wide Web, commonly referred to as the Internet, as the new frontier for electronic commerce or ecommerce. As a result many businesses are developing applications and/or websites in order to conduct e-commerce on the Internet without properly considering the implications of the certification system that they are choos...
—In this paper, we propose two certificate mechanisms for preventing the Sybil attack in a vehicular ad hoc network (VANET): the timestamp series approach and the temporary certificate approach. We focus on an early-stage VANET when the number of smart vehicles is only a small fraction of the vehicles on the road and the only infrastructure components available are the roadside units (RSUs). Un...
All human co-operation is based on trust, meaning that we choose co-operation partners and make commitment decisions based on how much we trust the other party. Digital certificates and public-key infrastructures represent an attempt to mimic real-world human assessment of identity and trustworthiness in an automated and mechanical fashion, but present implementations are based on a very limite...
This paper discusses considerations for certificate issuing systems and certificate processing applications, and directory systems in environments that employ nonhierarchical public key infrastructures (PKIs). The observations and recommendations here, while applicable to almost any non-hierarchical PKI, are most relevant to situations where the establishment of interoperability among the PKIs ...
Implementing X.509 based public-key infrastructure requires following a complex set of rules to establish if a public key certificate is valid. The XML Key Management Specification has been developed as one way in which the implementation burden can be reduced by moving some of this complexity from clients and onto a server. In this paper we give a brief overview of the XML key management speci...
Public key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a Public Key Infrastructure (PKI). PKIs have become a central asset for many organizations, due to distributed IT and users. Even though the usage of PKIs in closed and controlled environments is quite common, interoperability a...
The concept of signcryption, introduced to the public by Zheng [19], is a primitive that combines the functions of both digital signature and public key encryption. The efficiency of signcryption is higher than sequential composition of digital signature and public key encryption. Identity-based signcryption is a specific type of signcryption, in which each user’s public key can be a string ide...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید