نتایج جستجو برای: پیاده سازی زیر ساخت امنیتی کلید عمومی pki و pki e

تعداد نتایج: 1775914  

Journal: :American journal of physiology. Cell physiology 2002
Hazel Lum Zengping Hao Dave Gayle Priyadarsini Kumar Carolyn E Patterson Michael D Uhler

The expression and function of the endogenous inhibitor of cAMP-dependent protein kinase (PKI) in endothelial cells are unknown. In this study, overexpression of rabbit muscle PKI gene into endothelial cells inhibited the cAMP-mediated increase and exacerbated thrombin-induced decrease in endothelial barrier function. We investigated PKI expression in human pulmonary artery (HPAECs), foreskin m...

2001
STANISLAV MILANOVIC ZORAN PETROVIC

This paper explores an Internet-based VPN solution, built upon IPSec, which combines tunneling with PKI authentication and encryption. To protect the valuable company resources, an efficient intrusion/misuse detection and response system was incorporated into deployed security solution. This approach enabled a large-scale customer provide their global e-business safely. As a result, an integrat...

Journal: :Computer Communications 2007
Yong Lee Jaeil Lee JooSeok Song

With the advent of wireless communication and internet protocol, many technologies have been developed to provide mobile phone user with the wireless internet service. Security supporting wireless internet must be guaranteed at same level as the wired security. But PKI (Public Key Infrastructure) which is used for the security of e-commerce in wired internet is not suitable for the mobile phone...

Journal: :The Journal of the Institute of Image Information and Television Engineers 2003

2012
Anup Bhattacharya Abhijit Das Dipanwita Roy Chowdhury Aravind Iyer Debojyoti Bhattacharya

Privacy and authenticity are two essential security attributes of secure Vehicle-to-Vehicle communications. Pseudonymous Public Key Infrastructure (PPKI), an extension of standard PKI, has been proposed to achieve these security attributes. In Pseudonymous PKI, a user needs certificates or pseudonyms periodically from the Certificate Authority (CA) to authenticate messages anonymously. But the ...

Journal: :CoRR 2009
Nasir Mahmood Malik Tehmina Khalil Samina Khalid Faisal Munir Malik

The paper includes Public Key Infrastructure (PKI), its need and requirements and introduction of some renowned PKI products. However, the major thrust of this work is that how PKI can enhance security of various systems. The paper is intended to serve as a guide on how to adequately prepare for some of the challenges that may be encountered especially in developing countries like Pakistan. The...

2005
ZHANG Shaomin WANG Baoyi

Organizations use PKI (Public Key Infrastructures) to support internal business processes, but some businesses have industrial partnerships with others, and these alliances can exploit B2B (Business to Business) e-commerce capabilities by connecting corporate PKI. The paper deals with two methods to realize access control in extended organization PKI business processes: BCAs (Bridge Certificati...

Journal: :Brazilian Keynesian Review 2023

Post-Keynesian institutionalism (PKI)—a branch of the (original) institutionalist school that builds on common ground with post-Keynesianism—constitutes a robust tradition secure foundations and broad methodological, analytical, policy contours. Since its emergence in 1980s, has consistently been ahead economic mainstream shedding light real-world problems. Drawing work various heterodox econom...

2015
Louise Axon

Conventional public key infrastructure (PKI) designs are not optimal and contain security flaws; there is much work underway in improving PKI. The properties given by the Bitcoin blockchain and its derivatives are a natural solution to some of the problems with PKI in particular, certificate transparency and elimination of single points of failure. Recently-proposed blockchain PKI designs are b...

2006
Yih-Chun Hu David A. McGrew Adrian Perrig Brian Weis Dan Wendlandt

Most secure routing proposals require the existence of a global public-key infrastructure (PKI) to bind a public/private key-pair to a prefix, in order to authenticate route originations of that prefix. A major difficulty in secure routing deployment is the mutual dependency between the routing protocol and the establishment of a globally trusted PKI for prefixes and ASes: cryptographic mechani...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید