نتایج جستجو برای: پیاده سازی زیر ساخت امنیتی کلید عمومی pki و pki e
تعداد نتایج: 1775914 فیلتر نتایج به سال:
We describe a number of technical, legal, policy and business issues related to the development and deployment of Canada’s PKI-based solution for authenticating individuals and businesses. We argue that tackling these issues is critical in order for Canada’s PKI-based solution to truly transform Canada’s e-government services delivery, and we offer insights into options that could resolve outst...
PURPOSE The aim of this study was to show preclinical efficacy and clinical development potential of PKI-587, a dual phosphoinositide 3-kinase (PI3K)/mTOR inhibitor. EXPERIMENTAL DESIGN In vitro class 1 PI3K enzyme and human tumor cell growth inhibition assays and in vivo five tumor xenograft models were used to show efficacy. RESULTS In vitro, PKI-587 potently inhibited class I PI3Ks (IC(5...
Password-enabled PKI facilitates the private key management by integrating easy-to-use passwords into PKI. In the first PKI research workshop, Sandhu et al. categorized password-enabled PKI schemes as virtual soft tokens and virtual smartcards [26]. Compared to the conventional PKI, password-enabled PKI introduces a security-critical server where large number of password-related credentials are...
Message authentication and key exchange are two of the most basic tasks of cryptography. Solutions based on public-key infrastructure (PKI) are prevalent. Still, the state of the art in composable security analysis of PKI-based authentication and key exchange is somewhat unsatisfactory. Specifically, existing treatments either (a) make the unrealistic assumption that the PKI is accessible only ...
Device authentication can reinforce the security of the home network services by ensuring that only specific authorized devices by specific authorized users can access the services. And it is also a mandatory technology for context-aware services in which users are not participant in the service flow. In this paper, we propose a device authentication and access control scheme based on two-layer...
This article provides a contribution to innovation research in the field of electronic signatures, particularly to the future development of the aspects of diffusion throughout the IT-technology of the "Public Key Infrastructure" (PKI). In the modern Internet economy, PKI-technology is generally seen as the basis for obligatory authentication and safe communication. Nowadays, large scale enterp...
The deployment of a “public-key infrastructure” (PKI) has recently started. Another recent concern in business and on the national level is the issue of escrowed encryption, key recovery, and emergency access to information (e.g., in the medical record area). Independent development of a PKI and an escrowed PKI (whenever required or desired) will pose a lot of constraints, duplication efforts a...
Public key infrastructures (PKIs) exist for a number of purposes. One purpose is achieving widespread deployment of secure communication; the PKI makes it easy for two parties to communicate securely. Another purpose is that of secure delivery to a recipient; the PKI makes sure that when Alice sends a message to Bob, it arrives to the very Bob for whom Alice intended it. This white paper descri...
PKI is comprised of many components: technical infrastructure, policies, procedures, and people. Initial registration of subscribers (users, organizations, hardware, or software) for a PKI service has many facets, pertaining to almost every one of the PKI components. There are many steps between the moment when subscribers apply for PKI certificates and the final state, when keys have been gene...
Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract The objective of this document is to establish a terminology framework and to suggest the operational requirements of Public Key Infrastructure (PKI) domain for interoperability of multi-domain Public Key Infrastruc...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید