نتایج جستجو برای: پیاده سازی زیر ساخت امنیتی کلید عمومی pki و pki e
تعداد نتایج: 1775914 فیلتر نتایج به سال:
In Public Key Infrastructures (PKIs), trusted Certification Authorities (CAs) issue public key certificates which bind public keys to the identities of their owners. This enables the authentication of public keys which is a basic prerequisite for the use of digital signatures and public key encryption. These in turn are enablers for ebusiness, e-government and many other applications, because t...
It has been conventional wisdom that, for e-commerce to fulfil its potential, each party to a transaction must be confident about the identity of the others. Digital signature technology, based on public key cryptography, has been claimed as the appropriate means of achieving this aim. Digital signatures do little, however, unless a substantial ’public key infrastructure’ (PKI) is in place to p...
Public key infrastructure (PKI) plays a fundamental role in securing the of Internet through certification public keys used asymmetric encryption. It is an industry standard by both and private entities that costs lot resources to maintain secure. On other hand, identity-based cryptography removes need for certificates, which turn lowers cost. In this work, we present practical implementation h...
There exist many obstacles that slow the global adoption of public key infrastructure (PKI) technology. The PKI interoperability problem, being poorly understood, is one of the most confusing. In this paper, we clarify the PKI interoperability issue by exploring both the juridical and technical domains. We demonstrate the origin of the PKI interoperability problem by determining its root causes...
Car-2-Car communication requires the use of pseudonymous public keys to ensure the vehicle’s privacy by making its messages unlinkable over a longer period. The Pseudonymous PKI (PPKI) for Ubiquitous Computing by K. Zeng [Ze06] offers peer-side pseudonym generation, non-repudiation and an efficient revocation mechanism that excludes the revoked peers from the group of authorized participants. I...
Renal cell carcinoma (RCC) frequently produces metastases to the musculoskeletal system that are a major source of morbidity in the form of pain, immobilization, fractures, neurological compromise, and a decreased ability to perform activities of daily living. Patients with metastatic RCC therefore have a dismal prognosis because there is no effective adjuvant treatment for this disease. Becaus...
The amino acid sequence of the heat-stable inhibitor of the cAMP-dependent protein kinase (PKI) was determined recently [Scott, J. D., Fischer, E. H., Takio, K., Demaille, J. G. & Krebs, E. G. (1985) Proc. Natl. Acad. Sci. USA 82, 5732-5736]. An earlier report [Scott, J. D., Fischer, E.H., Demaille, J. G. & Krebs, E. G. (1985) Proc. Natl. Acad. Sci. USA 82, 4379-4383] showed that at least part ...
To deal with the threats to the PKI authentication system from the internet and the real world, based on the analysis of biometric identification and nonsymmetric key technology, this paper presented a new PKI authentication system through the integration of Biometric identification and non-symmetric key technology, which assembled their advantages and made up their disadvantages to each other ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید