نتایج جستجو برای: pki

تعداد نتایج: 1556  

Journal: :Journal of Computer Security 2006
Marcus Lippert Evangelos G. Karatsiolis Alexander Wiesmaier Johannes A. Buchmann

Companies and organizations employ PKI technology to secure the communication in their intranets and over the internet. The services of authentication, non-repudiation, con dentiality and the transport of authorization information are often supported by X.509 certi cates. The synchronization of the certi cates' life-cycle with the management of the PKI users is a common problem. We propose a me...

2007
Montse Rubia Juan Carlos Cruellas Manel Medina

This paper concerns the barriers to interoperability that exist between the X.509 and EDIFACT Public Key Infrastructures (PKI), and proposes a method to overcome them. The solution lies in the DED-ICA 1 (Directory based EDI Certiicate Access and management) TELEM-ATIC Project, funded by the European Union. The main objective of this project is to deene and provide means to make these two infras...

2003
Stefaan Seys Bart Preneel

In this paper we present a key management protocol for wireless ad hoc multi-hop networks. Two objectives were crucial in our design: (1) distributed trust to ensure robustness, and (2) strong authentication to prevent the battery drain attack. We achieve distributed trust by presenting a hierarchical and distributed public key infrastructure for ad hoc networks. Our PKI has been designed to ma...

Journal: :Neuroendocrinology 2017
Helma Freitag Friederike Christen Florentine Lewens Irina Grass Franziska Briest Sara Iwaszkiewicz Britta Siegmund Patricia Grabowski

BACKGROUND The characteristic clinical heterogeneity and mostly slow-growing behavior of gastroenteropancreatic neuroendocrine neoplasms (GEP-NENs) cause problems in finding appropriate treatments. Thus, the current therapy options are not satisfactory. PKI-587 is a highly potent, novel dual inhibitor of PI3K and mTORC1/C2. AIM We assessed the effects of PKI-587 in different GEP-NEN tumor mod...

2014
Hiroaki Anada Junpei Kawamoto Jian Weng Kouichi Sakurai

A public key infrastructure (PKI) is for facilitating the authentication and distribution of public keys. Currently, the most commonly employed approach to PKI is to rely on certificate authorities (CAs), but recently there has been arising more need for decentralized peer-to-peer certification like Webs of Trust. In this paper, we propose an identity-embedding method suitable for decentralized...

2013
Tucker L. Ward

PKI may be pushed beyond known limits when scaled to some visions of the smart grid; our research developed a simulation, Grid Cryptographic Simulation (GCS), to evaluate these potential issues, identify cryptographic bottlenecks, and evaluate tradeoffs between performance and security. Ultimately, GCS can be used to identify scalability challenges and suggest improvements to make PKI more effi...

2003
Roger Clarke

What are the nails for which public key technologies are supposed to be the hammer? This paper examines the kinds of assertions that e-business needs to be authenticated, and evaluates conventional and alternative public key infrastructures (PKI) against those requirements. It concludes that the root cause of the limited success enjoyed by public key technologies has been inadequate requirement...

2004
Steve Purser

Despite much of the negative publicity that it has suffered recently, Public Key Infrastructure (PKI) continues to play a critical role in underpinning security on the Internet and other potentially hostile network environments. In such environments, it is common to deploy secure protocols to deliver one or more standard network security services (authentication, confidentiality protection, int...

2007
Jaap-Henk Hoepman Geert Kleinhuis

We present a use case of the introduction of a large scale Public Key Infrastructure (PKI) environment in an incumbent telecommunications company in The Netherlands. The main characteristics of the case are the integration of an existing physical access facility with a PKI environment for logical security of the company ICT infrastructure. In fact, both are accessed using a single (smart) compa...

2002
Peter Hesse David Lemire

This paper discusses considerations for certificate issuing systems and certificate processing applications, and directory systems in environments that employ nonhierarchical public key infrastructures (PKIs). The observations and recommendations here, while applicable to almost any non-hierarchical PKI, are most relevant to situations where the establishment of interoperability among the PKIs ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید