نتایج جستجو برای: pki

تعداد نتایج: 1556  

2003

Public Key Infrastructure (PKI) is one of the primary weapons in the Department of Defense’s (DoD) “defense in depth” information assurance strategy, and will be used to sign all DoD e-mail messages by October 2003. PKI uses asymmetric “public” and “private” keys to sign and/or encrypt e-mail messages and other information. The effect of this additional workload on the existing network and serv...

2001
Xiu-Gi Zeng Chung-Huang Yang

CA and PKI are crucial parts of many secure network applications. In this paper, we present our effort in the design and implementation of CA/PKI on the PC Windows environment. The Borland C++Builder 5 is used as a software tool to develop client and server software while the Microsoft SQL is used to manage X.509v3 certificates stored at CA. Our CA server is also equipped with a proprietary har...

2007
Massimiliano Pala Sean W. Smith

The central goal of Public Key Infrastructure (PKI) is to enable trust judgments between distributed users. Although certificates play a central role in making such judgments, a PKI’s users need more than just knowledge of certificates. Minimally, a relying party must able to locate critical parameters such the certificate repositories and certificate validation servers relevant to the trust pa...

Journal: :CoRR 2010
Abdullah Al Hasib Abdullah Azfar Muhammad Sarwar Jahan Morshed

The Session Initiation Protocol (SIP) has become the most predominant protocol for Voice over Internet Protocol (VoIP) signaling. Security of SIP is an important consideration for VoIP communication as the traffic is transmitted over the insecure IP network. And the authentication process in SIP ranges from preshared secret based solutions to Public Key Infrastructure (PKI) based solution. Howe...

Journal: :IACR Cryptology ePrint Archive 2017
Alan Szepieniec Ward Beullens Bart Preneel

It is well known that multivariate quadratic (MQ) digital signature schemes have small signatures but huge public keys. However, in some settings, such as public key infrastructure (PKI), both variables are important. This paper explains how to transform any MQ signature scheme into one with a much smaller public key at the cost of a larger signature. The transformation aims to reduce the combi...

2012

An exploration of the benefits and challenges of a PKI based on elliptic curve cryptography

2009
Michele Nogueira Lima Eduardo da Silva Aldri Luiz dos Santos Luiz Carlos P. Albini Guy Pujolle

Resumo Cryptographic techniques are at the center of security solutions for wireless ad hoc networks. Public key infrastructures (PKIs) are essential for their efficient operation. However, the fully distributed organization of these networks makes a challenge to design PKIs. Changes in network paradigms and the increasing dependency on technology require more dependable and sur-vivable PKIs. T...

2003
S. Farrell

This document describes the Internet X.509 Public Key Infrastructure (PKI) Certificate Management Protocol (CMP). Protocol messages are defined for X.509v3 certificate creation and management. CMP provides online interactions between PKI components, including an exchange between a Certification Authority (CA) and a client system. Adams & Farrell Expires Oct. 2003 [Page 1] Introduction and Termi...

1999
Rolf Oppliger Andreas Greulich Peter Trachsel

Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (PKI). A PKI, in turn, consists of one or several certification authorities (CAs) that issue and revoke certificates for users and other CAs. Contrary to its conceptual simplicity, the establishment and operational maint...

2005
John Marchesini Sean W. Smith

PKIs are complex distributed systems that are responsible for giving users enough information to make reasonable trust judgments about one another. Since the currencies of PKI are trust and certificates, users who make trust decisions (often called relying parties) must do so using only some initial trust beliefs about the PKI and some pile of certificates (and other assertions) they received f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید