نتایج جستجو برای: pki

تعداد نتایج: 1556  

2006
Yih-Chun Hu David A. McGrew Adrian Perrig Brian Weis Dan Wendlandt

Most secure routing proposals require the existence of a global public-key infrastructure (PKI) to bind a public/private key-pair to a prefix, in order to authenticate route originations of that prefix. A major difficulty in secure routing deployment is the mutual dependency between the routing protocol and the establishment of a globally trusted PKI for prefixes and ASes: cryptographic mechani...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2021

2006
Arsalan Tavakoli

Most secure routing proposals require the existence of a global public-key infrastructure (PKI) to bind a public/private key-pair to a prefix, in order to authenticate route originations of that prefix. A major difficulty in secure routing deployment is the mutual dependency between the routing protocol and the establishment of a globally trusted PKI for prefixes and ASes: cryptographic mechani...

2013
Pita Jarupunphol Wipawan Buathong

General purpose (open) and application-specific (closed) PKIs are two main categories of PKI that support a variety of cryptographic operations for providing secure environment. SSL/TLS and SET are two distinct security protocols utilising these PKI categories for securing e-commerce transactions. While the former protocol categorised as a general purpose PKI has been playing an important role ...

2005
Stephen Wilson

Public Key Infrastructure around the world has had mixed success over the past ten years. Some jurisdictions (like Australia and the USA) have been left largely disillusioned by the hype, while others (like China and Korea) see PKI as indispensable infrastructure for e-business. The typical situation around Asia is that PKI is highly desirable but difficult and/ or costly to implement. Regulato...

2007
Daniel Kouřil Michal Procházka Luděk Matyska

PKI shows some weaknesses when used in real deployment, such as problems with securing the private key, combination of PKI with other authentication systems, availability of revocation information, user-friendliness of PKI system and relationship with federation systems. In this paper we present solutions that were used during PKI deployment in a grid distributed environment.

2002
Marie Henderson Robert S. Coulter Ed Dawson Eiji Okamoto

The development of Public Key Infrastructures (PKIs) is highly desirable to support secure digital transactions and communications throughout existing networks. It is important to adopt a particular trust structure or PKI model at an early stage as this forms a basis for the PKI’s development. Many PKI models have been proposed but use only natural language descriptions. We apply a simple forma...

Journal: :Cell proliferation 2007
R Rahmanzadeh G Hüttmann J Gerdes T Scholzen

OBJECTIVES Expression of the nuclear Ki-67 protein (pKi-67) is strongly associated with cell proliferation. For this reason, antibodies against this protein are widely used as prognostic tools for the assessment of cell proliferation in biopsies from cancer patients. Despite this broad application in histopathology, functional evidence for the physiological role of pKi-67 is still missing. Rece...

Journal: :Clinical cancer research : an official journal of the American Association for Cancer Research 2001
C C Solorzano C H Baker R Tsan P Traxler P Cohen E Buchdunger J J Killion I J Fidler

We determined the optimal administration schedule of a novel epidermal growth factor receptor (EGFR) protein tyrosine kinase inhibitor (PKI), PKI 166 (4-(R)-phenethylamino-6-(hydroxyl)phenyl-7H-pyrrolo[2.3-d]-pyrimidine), alone or in combination with gemcitabine (administered i.p.) for therapy of L3.6pl human pancreatic carcinoma growing in the pancreas of nude mice. Seven days after orthotopic...

2003
Volker Hammer Dörte Neundorf Albrecht Rosenhauer Andreas Schmidt

Zusammenfassung: Public Key Infrastrukturen (PKI) erschließen ihren Nutzen für die Anwender erst dann in vollem Umfang, wenn abgegrenzte PKI-Realisierungen (Domänen), z. B. in Unternehmen, zu einer Domänen-übergreifenden Infrastruktur zusammengefügt werden. Dazu ist die Bereitstellung von Zertifikaten und Sperrlisten über die Grenzen der einzelnen PKI-Domänen hinaus erforderlich. Die Veröffentl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید