نتایج جستجو برای: پیاده سازی زیر ساخت امنیتی کلید عمومی pki و pki e
تعداد نتایج: 1775914 فیلتر نتایج به سال:
This survey covers basic information about public key infrastructures and summarizes the predominant technology and standards. Special attention is given to mechanisms for certificate revocation. Methods for CRL distribution and validity checking are compared. Supported by KDD R&D Laboratories, Inc.
The advantage of the ID-based authentication protocols over public-key based protocols is that authentication can be performed by simply knowing the identity of a party. Meanwhile, Public Key Infrastructure (PKI) provides a suite of excellent security and user management mechanisms that can be easily deployed to the Internet. In this paper, we present an ID-based proxy authentication protocol t...
هدف: پژوهش حاضر با هدف ساخت برنامه داربستسازی انگیزشی و تعیین اثربخشی آن بر جهتگیریهای هدفی ارزیابیهای شناختیوالدین انجام شد. روش: پس از طراحی آموزشی داربست سازی اساس نقشه نگاری مداخله، به منظور بررسی شبهآزمایشی طرح پیشآزمون ـ پسآزمون همراه پیگیری گروه گواه استفاده جامعه آماری شامل تمامی والدین دانشآموزان پایه هشتم منطقة 4 آموزش پرورش شهر تهران نمونة نیز 30 مادر دارای فرزند کلاس هفتم ب...
We propose Surety Bond PKI, an alternative to high assurance certificates which increases cost disparity between fake and legitimate web sites.
This paper presents two related activities, the first is the OASIS Digital Signature Services (DSS) standard, the second is the application of digital signatures to electronic invoicing as recognised under recent European legislation. DSS can be used to support a range of signature formats including the binary “cryptographic message syntax” and XML signatures, as well as related extended format...
We spend much of our time trying to communicate with each other. Wide-spread use of the Internet has increased the number of ways and the amount we communicate with each other. For example, we may now spend many hours per day simply writing and replying to e-mails. Like normal communication, there is information that can be publicly known (or at least we do not care if someone else knows it), a...
Establishing trustworthiness requires an analysis of the business, technical and legal requirements for each party to a Public Key Infrastructure (PKI) based transaction. Much of the current discussion about PKI requirements revolves around the license, accreditation, or other sets of ratings as applied to certification authorities (CA). It is becoming apparent that an exclusive focus on CA qua...
Enrollment messages and responses may be transferred between clients and servers using file-system-based mechanisms, such as when enrollment is performed for an off-line client. When files are used to transport binary, Full PKI Request or Full PKI Response messages, there MUST be only one instance of a request or response message in a single file. The following file type extensions SHOULD be used:
Often, the main motivation for using PKI in business environments is to streamline workflow, by enabling humans to digitally sign electronic documents, instead of manually signing paper ones. However, this application fails if adversaries can construct electronic documents whose viewed contents can change in useful ways, without invalidating the digital signature. In this paper, we examine the ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید