نتایج جستجو برای: pki

تعداد نتایج: 1556  

Journal: :Computer Networks 2001
Peter Alterman

The goals of the U.S. Federal PKI are to create a cross-governmental, ubiquitous, interoperable Public Key Infrastructure and the development and use of applications which employ that PKI in support of Agency business processes. In addition, the U.S. Federal PKI must interoperate with State governments and with other national governments. Our goals recognize that the purpose of deploying a PKI ...

Journal: :Molecular cell 2009
Nobuhiko Kamoshita Akio Nomoto Uttam L RajBhandary

Translation initiation of the second ORF of insect dicistrovirus RNA depends on an internal ribosomal entry site (IRES) in its intergenic region (IGR) and is exceptional in using a codon other than AUG and in not using the canonical initiator methionine tRNA. Studies in vitro suggest that pseudoknot I (PKI) immediately preceding the initiation codon occupies the ribosomal P site and that an elo...

Journal: :Int. J. Found. Comput. Sci. 2007
Benjamin Aziz Geoff W. Hamilton

In this technical report, we present a process algebra aimed at modelling PKI-based systems. The new language, SPIKY, extends the spi-calculus by adding primitives for the retrieval of certified/uncertified public keys as well as private keys belonging to users of the PKI-based system. SPIKY also formalises the notion of process ownership by PKI users, which is necessary in controlling the sema...

Journal: :Cancer research 2002
Cheryl H Baker Carmen C Solorzano Isaiah J Fidler

We determined whether concurrent blockage of vascular endothelial growth factor (VEGF) receptor and epidermal growth factor (EGF) receptor signaling by two novel tyrosine kinase inhibitors, PTK 787 and PKI 166, respectively, can inhibit angiogenesis and, hence, the growth and metastasis of human pancreatic carcinoma in nude mice. Highly metastatic human pancreatic carcinoma L3.6pl cells were in...

2010
Vipul Goyal

With more and more acceptance of Digital Certificates and Public Key Infrastructures (PKI), the mechanisms to revoke a certificate in a PKI have recently received increasing attention. The revocation mechanisms are commonly classified into Certificate Revocation Lists (CRLs), trusted dictionaries and online mechanisms. The designer of a PKI should select an appropriate revocation method suiting...

Journal: :I. J. Network Security 2017
Mohammed Hassouna Bazara I. A. Barry Eihab B. M. Bashier

Despite the fact that the traditional public key infrastructure provides Level 3 trusted authority, but its two major problems of scalability and certificate management raised the need to an alternative security infrastructure. That motivated the appearance of new technologies to replace the traditional PKI, such as the Identity based encryption, the certificateless encryption, etc. But all tho...

2012
A. Jaya Lakshmi

In this paper we introduce an efficient approach for the secure PKI key generation on the idea of multiple modalities Iris and fingerprint. Contributions include a general approach for trivialities purpose generation, distinguishable iris feature generation and a PKI key generation mechanism. The image processing techniques are used to extract a biometric measurement from the fingerprint and ir...

Journal: :EPJ Quantum Technology 2021

Quantum computing technologies pose a significant threat to the currently employed public-key cryptography protocols. In this paper, we discuss impact of quantum on public key infrastructures (PKIs), which are used as part security systems for protecting production environments. We analyze issues existing models with focus requirements fast transition post-quantum solutions. Although our primar...

2009

34 Published by the ieee ComPuter soCiety ■ 1540-7993/09/$25.00 © 2009 ieee ■ ieee seCurity & PrivaCy A public-key infrastructure is a collection of hardware, software, processes, and people that together provide security services based on public-key cryptography. Many countries, including Norway, Sweden, Denmark, Finland, Estonia, Austria, Belgium, and Canada, have introduced large-scale secur...

2003
D. M. Needham M. M. McMahon J. B. Datko

Ad hoc networks implemented with Jini technology permit users to enter a network, and become clients of services, without apriori knowledge of the network or its services. Although traditional Public Key Infrastructure (PKI) approaches to authentication are generally static, we employ PKI in a manner consistent with the dynamic nature of ad hoc networks. This paper presents an algorithm that pr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید