نتایج جستجو برای: پیاده سازی زیر ساخت امنیتی کلید عمومی pki و pki e

تعداد نتایج: 1775914  

Journal: :International Journal for Research in Applied Science and Engineering Technology 2021

2006
Björn Fay Jörn Schweisgut Christian Tobias

Identitätsbasierte Kryptografie wird häufig als Lösung angeführt, um den komplexen und aufwändigen Aufbau und Betrieb einer Public Key Infrastruktur (PKI) zu vermeiden. Als öffentliche Schlüssel eines Benutzers dienen bei identitätsbasierter Kryptografie persönliche (aber öffentlich zugängliche) Daten dieses Benutzers, wie beispielsweise seine E-Mail-Adresse oder seine Telefonnummer. Eine überp...

2006
ZORAN V. ŽIVKOVIĆ MILORAD J. STANOJEVIĆ BOŽIDAR RADENKOVIĆ

The modern approach to the electronically transactions security in ebusiness applications implies synthesized application of the cryptographic systems and mechanisms within the public key infrastructure (PKI). Digital certificate of an e-business subject (user) represents a cryptographic mechanism with the highest security level. Since every PKI transaction security has been based on the tempor...

2006
Arsalan Tavakoli

Most secure routing proposals require the existence of a global public-key infrastructure (PKI) to bind a public/private key-pair to a prefix, in order to authenticate route originations of that prefix. A major difficulty in secure routing deployment is the mutual dependency between the routing protocol and the establishment of a globally trusted PKI for prefixes and ASes: cryptographic mechani...

2007
Daniel Kouřil Michal Procházka Luděk Matyska

PKI shows some weaknesses when used in real deployment, such as problems with securing the private key, combination of PKI with other authentication systems, availability of revocation information, user-friendliness of PKI system and relationship with federation systems. In this paper we present solutions that were used during PKI deployment in a grid distributed environment.

2002
Marie Henderson Robert S. Coulter Ed Dawson Eiji Okamoto

The development of Public Key Infrastructures (PKIs) is highly desirable to support secure digital transactions and communications throughout existing networks. It is important to adopt a particular trust structure or PKI model at an early stage as this forms a basis for the PKI’s development. Many PKI models have been proposed but use only natural language descriptions. We apply a simple forma...

Journal: :Cell proliferation 2007
R Rahmanzadeh G Hüttmann J Gerdes T Scholzen

OBJECTIVES Expression of the nuclear Ki-67 protein (pKi-67) is strongly associated with cell proliferation. For this reason, antibodies against this protein are widely used as prognostic tools for the assessment of cell proliferation in biopsies from cancer patients. Despite this broad application in histopathology, functional evidence for the physiological role of pKi-67 is still missing. Rece...

2003
Roger Clarke

What are the nails for which public key technologies are supposed to be the hammer? This paper examines the kinds of assertions that e-business needs to be authenticated, and evaluates conventional and alternative public key infrastructures (PKI) against those requirements. It concludes that the root cause of the limited success enjoyed by public key technologies has been inadequate requirement...

Journal: :Clinical cancer research : an official journal of the American Association for Cancer Research 2001
C C Solorzano C H Baker R Tsan P Traxler P Cohen E Buchdunger J J Killion I J Fidler

We determined the optimal administration schedule of a novel epidermal growth factor receptor (EGFR) protein tyrosine kinase inhibitor (PKI), PKI 166 (4-(R)-phenethylamino-6-(hydroxyl)phenyl-7H-pyrrolo[2.3-d]-pyrimidine), alone or in combination with gemcitabine (administered i.p.) for therapy of L3.6pl human pancreatic carcinoma growing in the pancreas of nude mice. Seven days after orthotopic...

2003
Volker Hammer Dörte Neundorf Albrecht Rosenhauer Andreas Schmidt

Zusammenfassung: Public Key Infrastrukturen (PKI) erschließen ihren Nutzen für die Anwender erst dann in vollem Umfang, wenn abgegrenzte PKI-Realisierungen (Domänen), z. B. in Unternehmen, zu einer Domänen-übergreifenden Infrastruktur zusammengefügt werden. Dazu ist die Bereitstellung von Zertifikaten und Sperrlisten über die Grenzen der einzelnen PKI-Domänen hinaus erforderlich. Die Veröffentl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید