نتایج جستجو برای: pki

تعداد نتایج: 1556  

Journal: :Organic letters 2005
Tanya L Schneider Rebecca S Mathew Kevin P Rice Kazuhiko Tamaki John L Wood Alanna Schepartz

[reaction: see text] Here we describe a miniature protein (1) that presents the cAMP-dependent protein kinase (PKA) recognition epitope found within the heat-stable Protein Kinase Inhibitor protein (PKI) and a miniature protein conjugate (1-K252a) in which 1 is joined covalently to the high-affinity but nonselective kinase inhibitor K252a. Miniature protein 1 recognizes PKA with an affinity tha...

2005
Evangelos G. Karatsiolis Marcus Lippert Alexander Wiesmaier

In this paper we provide a guide for public key infrastructure designers and administrators when planning for directory services. We concentrate on the LDAP directories and how they can be used to successfully publish PKI information. We analyse their available mechanisms and propose a best practice guide for use in PKI. We then take a look into the German Signature Act and Ordinance and discus...

Journal: :IACR Cryptology ePrint Archive 2009
Matthias Fitzi Dominik Raub

We define hybrid multi-party computation (HMPC) and hybrid broadcast (HBC) in a model without broadcast channels but assuming a signature scheme and a respective public-key infrastructure (PKI) among the players. The goal is to achieve unconditional (PKIand signature-independent) security up to a certain threshold, and security beyond this threshold under stronger assumptions, namely, that forg...

2005
Mike Just Danielle Rosmarin

We describe a number of technical, legal, policy and business issues related to the development and deployment of Canada’s PKI-based solution for authenticating individuals and businesses. We argue that tackling these issues is critical in order for Canada’s PKI-based solution to truly transform Canada’s e-government services delivery, and we offer insights into options that could resolve outst...

2006
Yehuda Lindell

.......................................................................................................3 Background ..................................................................................................4 Soft Tokens and Their Vulnerabilities ..........................................................5 Hardware Tokens and Smart Cards ......................................................

2005
Meiyuan Zhao Sean W. Smith David M. Nicol David F. Kotz M. Douglas McIlroy Carlisle Adams Charles K. Barlowe

The Border Gateway Protocol (BGP) that manages inter-domain routing on the Internet lacks security. Protective measures using public key cryptography introduce complexities and costs. To support authentication and other security functionality in large networks, we need public key infrastructures (PKIs). Protocols that distribute and validate certificates introduce additional complexities and co...

Journal: :Int. Arab J. Inf. Technol. 2016
Shivkumar Selvakumaraswamy Umamaheswari Govindaswamy

The demand for wireless networks is increasing rapidly and it becomes essential to design existing Public-Key Infrastructure (PKI) useful for wireless devices. A PKI is a set of procedures needed to create, distribute and revoke digital certificates. PKI is an arrangement that binds public keys with respective user identities by means of a Certificate Authority (CA). The user identity must be u...

Journal: :American journal of physiology. Lung cellular and molecular physiology 2001
F Liu A D Verin T Borbiev J G Garcia

To examine signaling mechanisms relevant to cAMP/protein kinase A (PKA)-dependent endothelial cell barrier regulation, we investigated the impact of the cAMP/PKA inhibitors Rp diastereomer of adenosine 3',5'-cyclic monophosphorothioate (Rp-cAMPS) and PKA inhibitor (PKI) on bovine pulmonary artery and bovine lung microvascular endothelial cell cytoskeleton reorganization. Rp-cAMPS as well as PKI...

2003
Seung Yi Robin Kravets

PKI has been recognized as one of the most effective tools for providing security for dynamic networks. However, providing such an infrastructure in ad hoc wireless networks is a challenging task due to their infrastructure-less nature. In this paper, we present these challenges in detail, identify the requirements for such solutions, and propose a practical PKI service for ad hoc networks. We ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید