نتایج جستجو برای: pki
تعداد نتایج: 1556 فیلتر نتایج به سال:
[reaction: see text] Here we describe a miniature protein (1) that presents the cAMP-dependent protein kinase (PKA) recognition epitope found within the heat-stable Protein Kinase Inhibitor protein (PKI) and a miniature protein conjugate (1-K252a) in which 1 is joined covalently to the high-affinity but nonselective kinase inhibitor K252a. Miniature protein 1 recognizes PKA with an affinity tha...
In this paper we provide a guide for public key infrastructure designers and administrators when planning for directory services. We concentrate on the LDAP directories and how they can be used to successfully publish PKI information. We analyse their available mechanisms and propose a best practice guide for use in PKI. We then take a look into the German Signature Act and Ordinance and discus...
We define hybrid multi-party computation (HMPC) and hybrid broadcast (HBC) in a model without broadcast channels but assuming a signature scheme and a respective public-key infrastructure (PKI) among the players. The goal is to achieve unconditional (PKIand signature-independent) security up to a certain threshold, and security beyond this threshold under stronger assumptions, namely, that forg...
We describe a number of technical, legal, policy and business issues related to the development and deployment of Canada’s PKI-based solution for authenticating individuals and businesses. We argue that tackling these issues is critical in order for Canada’s PKI-based solution to truly transform Canada’s e-government services delivery, and we offer insights into options that could resolve outst...
.......................................................................................................3 Background ..................................................................................................4 Soft Tokens and Their Vulnerabilities ..........................................................5 Hardware Tokens and Smart Cards ......................................................
The Border Gateway Protocol (BGP) that manages inter-domain routing on the Internet lacks security. Protective measures using public key cryptography introduce complexities and costs. To support authentication and other security functionality in large networks, we need public key infrastructures (PKIs). Protocols that distribute and validate certificates introduce additional complexities and co...
The demand for wireless networks is increasing rapidly and it becomes essential to design existing Public-Key Infrastructure (PKI) useful for wireless devices. A PKI is a set of procedures needed to create, distribute and revoke digital certificates. PKI is an arrangement that binds public keys with respective user identities by means of a Certificate Authority (CA). The user identity must be u...
To examine signaling mechanisms relevant to cAMP/protein kinase A (PKA)-dependent endothelial cell barrier regulation, we investigated the impact of the cAMP/PKA inhibitors Rp diastereomer of adenosine 3',5'-cyclic monophosphorothioate (Rp-cAMPS) and PKA inhibitor (PKI) on bovine pulmonary artery and bovine lung microvascular endothelial cell cytoskeleton reorganization. Rp-cAMPS as well as PKI...
PKI has been recognized as one of the most effective tools for providing security for dynamic networks. However, providing such an infrastructure in ad hoc wireless networks is a challenging task due to their infrastructure-less nature. In this paper, we present these challenges in detail, identify the requirements for such solutions, and propose a practical PKI service for ad hoc networks. We ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید