نتایج جستجو برای: پیاده سازی زیر ساخت امنیتی کلید عمومی pki و pki e

تعداد نتایج: 1775914  

2003
S. Farrell

This document describes the Internet X.509 Public Key Infrastructure (PKI) Certificate Management Protocol (CMP). Protocol messages are defined for X.509v3 certificate creation and management. CMP provides online interactions between PKI components, including an exchange between a Certification Authority (CA) and a client system. Adams & Farrell Expires Oct. 2003 [Page 1] Introduction and Termi...

1999
Rolf Oppliger Andreas Greulich Peter Trachsel

Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (PKI). A PKI, in turn, consists of one or several certification authorities (CAs) that issue and revoke certificates for users and other CAs. Contrary to its conceptual simplicity, the establishment and operational maint...

2005
John Marchesini Sean W. Smith

PKIs are complex distributed systems that are responsible for giving users enough information to make reasonable trust judgments about one another. Since the currencies of PKI are trust and certificates, users who make trust decisions (often called relying parties) must do so using only some initial trust beliefs about the PKI and some pile of certificates (and other assertions) they received f...

Journal: :Organic letters 2005
Tanya L Schneider Rebecca S Mathew Kevin P Rice Kazuhiko Tamaki John L Wood Alanna Schepartz

[reaction: see text] Here we describe a miniature protein (1) that presents the cAMP-dependent protein kinase (PKA) recognition epitope found within the heat-stable Protein Kinase Inhibitor protein (PKI) and a miniature protein conjugate (1-K252a) in which 1 is joined covalently to the high-affinity but nonselective kinase inhibitor K252a. Miniature protein 1 recognizes PKA with an affinity tha...

2005
Evangelos G. Karatsiolis Marcus Lippert Alexander Wiesmaier

In this paper we provide a guide for public key infrastructure designers and administrators when planning for directory services. We concentrate on the LDAP directories and how they can be used to successfully publish PKI information. We analyse their available mechanisms and propose a best practice guide for use in PKI. We then take a look into the German Signature Act and Ordinance and discus...

Journal: :IACR Cryptology ePrint Archive 2009
Matthias Fitzi Dominik Raub

We define hybrid multi-party computation (HMPC) and hybrid broadcast (HBC) in a model without broadcast channels but assuming a signature scheme and a respective public-key infrastructure (PKI) among the players. The goal is to achieve unconditional (PKIand signature-independent) security up to a certain threshold, and security beyond this threshold under stronger assumptions, namely, that forg...

2006
Yehuda Lindell

.......................................................................................................3 Background ..................................................................................................4 Soft Tokens and Their Vulnerabilities ..........................................................5 Hardware Tokens and Smart Cards ......................................................

Journal: :IEICE Transactions 2008
Koji Nakao

1. Scope The major topics include, but are not limited to: ‐ Security Technologies on (Network, AdHoc Network, P2P, Sensor Network, RFID, Wireless Network, Mobile Network, Home Network, NGN, and Future Internet) ‐ Access Control, Content Security, DRM, CDN, Privacy Protection, E-Commerce, PKI, Security Architecture, Security Protocol, Security Implementation, Technologies, Secure OS, Security E...

Journal: : 2021

در شهرهایی همچون اصفهان مناره نقش تأثیرگذاری حیطۀ فضای شهری بافت‌های تاریخی دارند؛ این بناها عملکردهای متفاوتی را پوشش می‌داده‌اند و دارای ویژگی‌های معماری، سازه‌ای، تزیینات گوناگون اجزای تشکیل‌دهندۀ خود بودند هستند. باور بنیادین محققان پژوهش حاضر آن است که فرم نهایی مناره‌های شهر به شکل مستقیم از نوع چینش آجرها، توانمندی استادکاران سنتی، پلان، تأثیر می‌پذیرد. با معرفی بررسی نمونه‌هایی موجود اص...

2012
Theodosios Tsiakis George Stephanides George Pekos

The growth of open networks created the interest to commercialise it. The establishment of an electronic business mechanism must be accompanied by a digital – electronic payment system to transfer the value of transactions. Financial organizations are requested to offer a secure e-payment synthesis with equivalent level of security served in conventional paper-based payment transactions. PKI, w...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید