نتایج جستجو برای: پیاده سازی زیر ساخت امنیتی کلید عمومی pki و pki e
تعداد نتایج: 1775914 فیلتر نتایج به سال:
This document describes the Internet X.509 Public Key Infrastructure (PKI) Certificate Management Protocol (CMP). Protocol messages are defined for X.509v3 certificate creation and management. CMP provides online interactions between PKI components, including an exchange between a Certification Authority (CA) and a client system. Adams & Farrell Expires Oct. 2003 [Page 1] Introduction and Termi...
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (PKI). A PKI, in turn, consists of one or several certification authorities (CAs) that issue and revoke certificates for users and other CAs. Contrary to its conceptual simplicity, the establishment and operational maint...
PKIs are complex distributed systems that are responsible for giving users enough information to make reasonable trust judgments about one another. Since the currencies of PKI are trust and certificates, users who make trust decisions (often called relying parties) must do so using only some initial trust beliefs about the PKI and some pile of certificates (and other assertions) they received f...
[reaction: see text] Here we describe a miniature protein (1) that presents the cAMP-dependent protein kinase (PKA) recognition epitope found within the heat-stable Protein Kinase Inhibitor protein (PKI) and a miniature protein conjugate (1-K252a) in which 1 is joined covalently to the high-affinity but nonselective kinase inhibitor K252a. Miniature protein 1 recognizes PKA with an affinity tha...
In this paper we provide a guide for public key infrastructure designers and administrators when planning for directory services. We concentrate on the LDAP directories and how they can be used to successfully publish PKI information. We analyse their available mechanisms and propose a best practice guide for use in PKI. We then take a look into the German Signature Act and Ordinance and discus...
We define hybrid multi-party computation (HMPC) and hybrid broadcast (HBC) in a model without broadcast channels but assuming a signature scheme and a respective public-key infrastructure (PKI) among the players. The goal is to achieve unconditional (PKIand signature-independent) security up to a certain threshold, and security beyond this threshold under stronger assumptions, namely, that forg...
.......................................................................................................3 Background ..................................................................................................4 Soft Tokens and Their Vulnerabilities ..........................................................5 Hardware Tokens and Smart Cards ......................................................
1. Scope The major topics include, but are not limited to: ‐ Security Technologies on (Network, AdHoc Network, P2P, Sensor Network, RFID, Wireless Network, Mobile Network, Home Network, NGN, and Future Internet) ‐ Access Control, Content Security, DRM, CDN, Privacy Protection, E-Commerce, PKI, Security Architecture, Security Protocol, Security Implementation, Technologies, Secure OS, Security E...
در شهرهایی همچون اصفهان مناره نقش تأثیرگذاری حیطۀ فضای شهری بافتهای تاریخی دارند؛ این بناها عملکردهای متفاوتی را پوشش میدادهاند و دارای ویژگیهای معماری، سازهای، تزیینات گوناگون اجزای تشکیلدهندۀ خود بودند هستند. باور بنیادین محققان پژوهش حاضر آن است که فرم نهایی منارههای شهر به شکل مستقیم از نوع چینش آجرها، توانمندی استادکاران سنتی، پلان، تأثیر میپذیرد. با معرفی بررسی نمونههایی موجود اص...
The growth of open networks created the interest to commercialise it. The establishment of an electronic business mechanism must be accompanied by a digital – electronic payment system to transfer the value of transactions. Financial organizations are requested to offer a secure e-payment synthesis with equivalent level of security served in conventional paper-based payment transactions. PKI, w...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید