نتایج جستجو برای: public
تعداد نتایج: 381305 فیلتر نتایج به سال:
In the USA, approximately 4% of the estimated 1 million Salmonella infections occurring annually are reported to public health. Administrative claims data from large health insurance companies capture disease-specific data which could potentially enhance public health surveillance. To determine the utility of medical claims data for public health reporting of Salmonella, we assessed medical cla...
Public Key Infrastructures (PKIs) are currently being deployed in increasing sizes, numbers, fast changing technologies, and varying environments but our operational experience to date has been limited to a relatively small scale and small number of environments. Consequently, some open technical and environmental interoperability problems about the ways in which PKIs will be organized and oper...
Certificate policies play a central role in public key infrastructures, since they are the basis for the evaluation of trust in binding between a key and a subject in a public key certificate. The absence of common ways of formally specifying details of policies is a source of difficulty in the operation of global public key infrastructures. In this paper, the problem of the formalisation of ce...
In this paper, we propose a short and efficient certificatebased signature (CBS) scheme. Certificate-based cryptography proposed by Gentry [6] combines the merit of traditional public key cryptography (PKI) and identity based cryptography, without use of the costly certificate chain verification process and the removal of key escrow security concern. Under this paradigm, we propose the shortest...
The “web of trust” is one approach to the problem of trusted exchange of public keys in a public key security system. In a web of trust, individuals accept the bulk of the responsibility for identifying and authenticating each other and subsequently swapping their keys. This trust model is supported by some commercial products and some industry standards. The main alternative is the Public Key ...
In this paper we take a closer look at the security and efficiency of public-key encryption and signature schemes in public-key infrastructures (PKI). Unlike traditional analyses which assume an “ideal” implementation of the PKI, we focus on the security of joint constructions that consider the certification authority (CA) and the users, and include a key-registration protocol and the algorithm...
Certificateless public key encryption is an advanced version of identity-based and public key encryption techniques. It eliminates the inherent key escrow and other key management issues in both techniques, e.g., it does not need any public key infrastructure or digital certificates. This paper presents a survey of the certificateless public key encryption schemes that have been proposed to imp...
Abstract Background & Aims: Toxocariasis or visceral larva migrans syndrome is a disease that appears by attack of extra intestinal animal nematode larvae of Toxocara canis to the human tissues. The present study was performed to evaluate the frequency of Toxocara eggs in public parks of Shiraz /Iran. Methods: A total of 20 parks from different regions of shiraz city were selected, and from dif...
in the french law, the properties of public entities and at the head of them, the properties of state are divided into public domain of public entities and private domain of public entities. the criterion of distinguishing of public properties of public entities is a procedural matter that has been taken from french doctrine, however the recent law of public entities ownership passed in 2006 ha...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید