نتایج جستجو برای: public good

تعداد نتایج: 781063  

2007
Reto Kohlas Ueli Maurer

Public-key authentication based on public-key certiicates is a special case of the general problem of verifying a hypothesis (that a public key is authentic), given certain pieces of evidence. Beginning with PGP, several authors have pointed out that trust is often an uncertain piece of evidence and have proposed ad hoc methods, sometimes referred to as trust management, for dealing with this k...

2002
Chandra Patni

As more and more companies conduct business with each other over the Internet, interoperable trust frameworks become important. For many businesses, trust provision is a critical issue in commencing B2B commerce transactional services. Communication over the Internet is by default open and uncontrolled and conflicts with the business needs of digital business. Privacy, confidentiality and integ...

2009
Gabriel A. Weaver Scott A. Rea Sean W. Smith

The trustworthiness of any Public Key Infrastructure (PKI) rests upon the expectations for trust, and the degree to which those expectations are met. Policies, whether implicit as in PGP and SDSI/SPKI or explicitly required as in X.509, document expectations for trust in a PKI. The widespread use of X.509 in the context of global e-Science infrastructures, financial institutions, and the U.S. F...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده فنی مهندسی 1385

acknowledge the importance of e-commerce to their countries and to survival of their businesses and in creating and encouraging an atmosphere for the wide adoption and success of e-commerce in the long term. the investment for implementing e-commerce in the public sector is one of the areas which is focused in government‘s action plan for cross-disciplinary it development and e-readiness in go...

1998
Ilari Lehti Pekka Nikander

A basic function of all signatures, digital or not, is to express trust and authority, explicit or implied. This is especially the case with digital signatures used in certificates. In this paper, we study the trust relationships expressed by the certificates used in X.509, PGP and SPKI. Especially, we present and revise the idea of a certificate loop, or a loop of certificates from the verifyi...

Journal: :international journal of health policy and management 2013
marianna fotaki

patient and user choice are at the forefront of the debate on the future direction of health and public services provision in many industrialized countries in europe and elsewhere. it is used both, as a means to achieve desired policy goals in public health care systems such as greater efficiency and improved quality of care, and as a good with its own intrinsic value. however, the evidence sug...

Journal: :Informatica, Lith. Acad. Sci. 2005
Geruta Kazakeviciute Eugenijus Januskevicius René Rosenbaum Heidrun Schumann

The paper describes methods for generating image watermark for asymmetric key based watermark embedding and detection scheme in wavelet domain. The proposed method combines DWT-based watermarking and the ability to verify watermark using reliable methods of asymmetric coding. The watermark scheme is developed to be directly incorporated into JPEG2000 image coding standard, while it can be used ...

2015
Dumitru Daniel Dinu Mihai Togan

DHCP is one of the most used network protocols, despite the security issues it has. Our work is motivated by the numerous attacks that can be launched against DHCP and the impact that they can have. Firstly, we formulate the constraints and design principles for a DHCP message authentication module that is flexible and easy to integrate with current DHCP implementations, while providing the nec...

2000
Reto Kohlas Ueli Maurer

Public-key authentication based on public-key certificates is a special case of the general problem of verifying a hypothesis (that a public key is authentic), given certain pieces of evidence. Beginning with PGP, several authors have pointed out that trust is often an uncertain piece of evidence and have proposed ad hoc methods, sometimes referred to as trust management, for dealing with this ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید