نتایج جستجو برای: pki
تعداد نتایج: 1556 فیلتر نتایج به سال:
The deployment of a “public-key infrastructure” (PKI) has recently started. Another recent concern in business and on the national level is the issue of escrowed encryption, key recovery, and emergency access to information (e.g., in the medical record area). Independent development of a PKI and an escrowed PKI (whenever required or desired) will pose a lot of constraints, duplication efforts a...
Public key infrastructures (PKIs) exist for a number of purposes. One purpose is achieving widespread deployment of secure communication; the PKI makes it easy for two parties to communicate securely. Another purpose is that of secure delivery to a recipient; the PKI makes sure that when Alice sends a message to Bob, it arrives to the very Bob for whom Alice intended it. This white paper descri...
PKI is comprised of many components: technical infrastructure, policies, procedures, and people. Initial registration of subscribers (users, organizations, hardware, or software) for a PKI service has many facets, pertaining to almost every one of the PKI components. There are many steps between the moment when subscribers apply for PKI certificates and the final state, when keys have been gene...
In this paper a simulation analysis of certain trust models (complex PKI architectures) with regard to the security support of B2B applications on the Internet is presented. The objective of such an analysis has been the choice of the most efficient PKI architecture and a solution of the cryptographic interoperability problem. A simulation model of protected B2B e-commerce has also been present...
Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract The objective of this document is to establish a terminology framework and to suggest the operational requirements of Public Key Infrastructure (PKI) domain for interoperability of multi-domain Public Key Infrastruc...
A digital certificate under Public Key Infrastructure has a defect of Man-in-the-Middle Attack that performs hash collision attacks. In this paper, we propose a robust biometric-PKI authentication system against Man-in-the-Middle Attack. The biometric-PKI authentication system consists of current PKI authentication and biometric authentication, which employs biometric data and a public key from...
Ivacaftor-lumacaftor and ivacaftor are two new breakthrough cystic fibrosis transmembrane conductance modulators. The interactions of ivacaftor and its two metabolites hydroxymethylivacaftor (iva-M1) and ivacaftorcarboxylate (iva-M6) with neurotransmitter receptors were investigated in radioligand binding assays. Ivacaftor displayed significant affinity to the 5-hydroxytryptamine (5-HT; seroton...
A multi-recipient signcryption (MRSC) scheme possesses the functionalities of both public-key encryption and digital signature to ensure integrity confidentiality transmitted messages. Moreover, an anonymous MRSC (AMRSC) retains while offering privacy-preserving, namely, a recipient’s identity or public key being hidden other recipients. In past, numerous AMRSC schemes based on various cryptogr...
A common complaint about PKI is that it is simply too hard to use at the end-user level. Somewhat surprisingly, there exists no PKI equivalent of DHCP or BOOTP for automated, transparent PKI setup, leaving the certificate user experience similar to the process of bringing up an X.25 link. This paper provides a PKI equivalent of these basic bootstrap services that provides automatic, transparent...
How to distribute resource locators is a fundamental problem in PKI. Our PKI Resource Query Protocol (PRQP), recently presented at IETF, provides a standard method to query for PKI resources locators. However the distribution of locators across PKIs is still an unsolved problem. In this paper, we propose an extension to PRQP in order to distribute PRQP messages over a Peer-to-Peer (P2P) network...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید