نتایج جستجو برای: پیاده سازی زیر ساخت امنیتی کلید عمومی pki و pki e
تعداد نتایج: 1775914 فیلتر نتایج به سال:
Identitätsbasierte Kryptografie wird häufig als Lösung angeführt, um den komplexen und aufwändigen Aufbau und Betrieb einer Public Key Infrastruktur (PKI) zu vermeiden. Als öffentliche Schlüssel eines Benutzers dienen bei identitätsbasierter Kryptografie persönliche (aber öffentlich zugängliche) Daten dieses Benutzers, wie beispielsweise seine E-Mail-Adresse oder seine Telefonnummer. Eine überp...
The modern approach to the electronically transactions security in ebusiness applications implies synthesized application of the cryptographic systems and mechanisms within the public key infrastructure (PKI). Digital certificate of an e-business subject (user) represents a cryptographic mechanism with the highest security level. Since every PKI transaction security has been based on the tempor...
Most secure routing proposals require the existence of a global public-key infrastructure (PKI) to bind a public/private key-pair to a prefix, in order to authenticate route originations of that prefix. A major difficulty in secure routing deployment is the mutual dependency between the routing protocol and the establishment of a globally trusted PKI for prefixes and ASes: cryptographic mechani...
PKI shows some weaknesses when used in real deployment, such as problems with securing the private key, combination of PKI with other authentication systems, availability of revocation information, user-friendliness of PKI system and relationship with federation systems. In this paper we present solutions that were used during PKI deployment in a grid distributed environment.
The development of Public Key Infrastructures (PKIs) is highly desirable to support secure digital transactions and communications throughout existing networks. It is important to adopt a particular trust structure or PKI model at an early stage as this forms a basis for the PKI’s development. Many PKI models have been proposed but use only natural language descriptions. We apply a simple forma...
OBJECTIVES Expression of the nuclear Ki-67 protein (pKi-67) is strongly associated with cell proliferation. For this reason, antibodies against this protein are widely used as prognostic tools for the assessment of cell proliferation in biopsies from cancer patients. Despite this broad application in histopathology, functional evidence for the physiological role of pKi-67 is still missing. Rece...
What are the nails for which public key technologies are supposed to be the hammer? This paper examines the kinds of assertions that e-business needs to be authenticated, and evaluates conventional and alternative public key infrastructures (PKI) against those requirements. It concludes that the root cause of the limited success enjoyed by public key technologies has been inadequate requirement...
We determined the optimal administration schedule of a novel epidermal growth factor receptor (EGFR) protein tyrosine kinase inhibitor (PKI), PKI 166 (4-(R)-phenethylamino-6-(hydroxyl)phenyl-7H-pyrrolo[2.3-d]-pyrimidine), alone or in combination with gemcitabine (administered i.p.) for therapy of L3.6pl human pancreatic carcinoma growing in the pancreas of nude mice. Seven days after orthotopic...
Zusammenfassung: Public Key Infrastrukturen (PKI) erschließen ihren Nutzen für die Anwender erst dann in vollem Umfang, wenn abgegrenzte PKI-Realisierungen (Domänen), z. B. in Unternehmen, zu einer Domänen-übergreifenden Infrastruktur zusammengefügt werden. Dazu ist die Bereitstellung von Zertifikaten und Sperrlisten über die Grenzen der einzelnen PKI-Domänen hinaus erforderlich. Die Veröffentl...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید