نتایج جستجو برای: pki

تعداد نتایج: 1556  

2000
Adam L. Young Moti Yung

The deployment of a “public-key infrastructure” (PKI) has recently started. Another recent concern in business and on the national level is the issue of escrowed encryption, key recovery, and emergency access to information (e.g., in the medical record area). Independent development of a PKI and an escrowed PKI (whenever required or desired) will pose a lot of constraints, duplication efforts a...

2003
Jon Callas

Public key infrastructures (PKIs) exist for a number of purposes. One purpose is achieving widespread deployment of secure communication; the PKI makes it easy for two parties to communicate securely. Another purpose is that of secure delivery to a recipient; the PKI makes sure that when Alice sends a message to Bob, it arrives to the very Bob for whom Alice intended it. This white paper descri...

2007
Alex Golod

PKI is comprised of many components: technical infrastructure, policies, procedures, and people. Initial registration of subscribers (users, organizations, hardware, or software) for a PKI service has many facets, pertaining to almost every one of the PKI components. There are many steps between the moment when subscribers apply for PKI certificates and the final state, when keys have been gene...

Journal: :Comput. Sci. Inf. Syst. 2006
Zoran V. Zivkovic Milorad J. Stanojevic

In this paper a simulation analysis of certain trust models (complex PKI architectures) with regard to the security support of B2B applications on the Internet is presented. The objective of such an analysis has been the choice of the most efficient PKI architecture and a solution of the cryptographic interoperability problem. A simulation model of protected B2B e-commerce has also been present...

Journal: :RFC 2008
Masaki Shimaoka Nelson E. Hastings Rebecca Nielsen

Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract The objective of this document is to establish a terminology framework and to suggest the operational requirements of Public Key Infrastructure (PKI) domain for interoperability of multi-domain Public Key Infrastruc...

2014
Han-Ul Jang Heung-Kyu Lee

A digital certificate under Public Key Infrastructure has a defect of Man-in-the-Middle Attack that performs hash collision attacks. In this paper, we propose a robust biometric-PKI authentication system against Man-in-the-Middle Attack. The biometric-PKI authentication system consists of current PKI authentication and biometric authentication, which employs biometric data and a public key from...

2018
Elena K Schneider Rachel M McQuade Vincenzo C Carbone Felisa Reyes-Ortega John W Wilson Brenda Button Ayame Saito Daniel P Poole Daniel Hoyer Jian Li Tony Velkov

Ivacaftor-lumacaftor and ivacaftor are two new breakthrough cystic fibrosis transmembrane conductance modulators. The interactions of ivacaftor and its two metabolites hydroxymethylivacaftor (iva-M1) and ivacaftorcarboxylate (iva-M6) with neurotransmitter receptors were investigated in radioligand binding assays. Ivacaftor displayed significant affinity to the 5-hydroxytryptamine (5-HT; seroton...

Journal: :IEEE Access 2022

A multi-recipient signcryption (MRSC) scheme possesses the functionalities of both public-key encryption and digital signature to ensure integrity confidentiality transmitted messages. Moreover, an anonymous MRSC (AMRSC) retains while offering privacy-preserving, namely, a recipient’s identity or public key being hidden other recipients. In past, numerous AMRSC schemes based on various cryptogr...

2003
Peter Gutmann

A common complaint about PKI is that it is simply too hard to use at the end-user level. Somewhat surprisingly, there exists no PKI equivalent of DHCP or BOOTP for automated, transparent PKI setup, leaving the certificate user experience similar to the process of bringing up an X.25 link. This paper provides a PKI equivalent of these basic bootstrap services that provides automatic, transparent...

2008
Massimiliano Pala Sean W. Smith

How to distribute resource locators is a fundamental problem in PKI. Our PKI Resource Query Protocol (PRQP), recently presented at IETF, provides a standard method to query for PKI resources locators. However the distribution of locators across PKIs is still an unsolved problem. In this paper, we propose an extension to PRQP in order to distribute PRQP messages over a Peer-to-Peer (P2P) network...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید