نتایج جستجو برای: پیاده سازی زیر ساخت امنیتی کلید عمومی pki و pki e
تعداد نتایج: 1775914 فیلتر نتایج به سال:
Many P2P applications require security services such as privacy, anonymity, authentication, and non-repudiation. Such services could be provided through a hierarchical Public Key Infrastructure. However, P2P networks are usually Internet-scale distributed systems comprised of nodes with undetermined trust level, thus making hierarchical solutions unrealistic. In this paper, we propose Chord-PKI...
This document describes the certification policy and PKI (Public Key Infrastructure) proposed by the ACTS project TRUMPET for inter-domain management between telecommunications providers, and for customer access to management functionality offered by providers. The PKI consists of one Certification Authority (CA) per provider, and one Inter-domain Management CA which certifies these CAs. At pre...
Establishing trust on certificates across multiple domains requires an efficient certification path discovery algorithm. Previously, small exmaples are used to analyze the performance of certification path discovery. In this work, we propose and implement a simulation framework and a probability search tree model for systematic performance evaluation. Built from measurement data collected from ...
Der Einsatz von Peer-to-Peer (P2P) Netzwerken verspricht im Vergleich zu Client-Server-Netzwerken eine bessere Skalierbarkeit, niedrigere Betriebskosten, die Nutzung bislang unausgelasteter Ressourcen und höhere Fehlertoleranz. Eine wichtige Eigenschaft von P2P-Netzwerken ist der Verzicht auf zentrale, vertrauenswürdige Instanzen. Die Realisierung einer Public-Key-Infrastruktur (PKI) basierend ...
Public Key Infrastructure (PKI) is well recognized as the only possible complete solution for network security problem nowadays, and Peerto-Peer (P2P) has also been viewed as one of the most potential network technology today. The design of CERNET (China Education and Research Network) PKI, which make the best of P2P technology to implement certification revocation information distribution, was...
Salomonsson, Max, Melinda Oker, Susan Kim, Hua Zhang, James E. Faber, and William J. Arendshorst. a1-Adrenoceptor subtypes on rat afferent arterioles assessed by radioligand binding and RT-PCR. Am J Physiol Renal Physiol 281: F172–F178, 2001.—We utilized [3H]prazosin saturation and competition radioligand binding studies to characterize the expression of a1-adrenoceptors in preglomerular vessel...
Public -key cryptography is a key technology for e-commerce, Intranets, extranets and other webenabled applications that require security and authentication in an open network. However, to earn the benefits of public-key cryptography, a supporting public -key infrastructure is needed to publish and manage public-keys. Without a functioning infrastructure, public-key cryptography is just the one...
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network bandwidth, server load, availability, etc.). In this paper we argue that C2C e-commerce is an application domain that maps naturally onto the emergent field of P2P systems simply by its underlying interaction model of ...
Digital Signature Act has been put into force since July 1999 to prepare a Infrastructure of secure and reliable electronic transaction in Korea. Korea Information Security Agency is the Root Certification Authority, which has four Licensed Certification Authorities subordinately, as of August 2001, approximately 900,000 certificates has been issued to be used in the area of internet banking, e...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید