نتایج جستجو برای: pki

تعداد نتایج: 1556  

2001
STANISLAV MILANOVIC ZORAN PETROVIC

This paper explores an Internet-based VPN solution, built upon IPSec, which combines tunneling with PKI authentication and encryption. To protect the valuable company resources, an efficient intrusion/misuse detection and response system was incorporated into deployed security solution. This approach enabled a large-scale customer provide their global e-business safely. As a result, an integrat...

2006
Tobias Straub

Introduction Contrary to analysts’ forecasts we heard some years ago, PKI (public key infrastructure) has not become a widespread technology yet. An important reason for this is the insufficient usability PKI-enabled applications are often blamed for [11]. Users’ behavior has turned out to be the biggest risk in security software [10], so usability issues deserve closer attention. Research in t...

Journal: :Clinical cancer research : an official journal of the American Association for Cancer Research 2003
Sun-Jin Kim Hisanori Uehara Takashi Karashima David L Shepherd Jerald J Killion Isaiah J Fidler

PURPOSE We determined whether blockade of the epidermal growth factor receptor (EGF-R) signaling pathway by oral administration of the EGF-R tyrosine kinase inhibitor (PKI 166) alone or in combination with injectable Taxol inhibits the growth of PC-3MM2 human prostate cancer cells in the bone of nude mice. EXPERIMENTAL DESIGN Male nude mice implanted with PC-3MM2 cells in the tibia were treat...

2013
Nadir Ulu Gemma M. Mulder Peter Vavrinec Sjoerd W. Landheer Basak Duman-Dalkilic Hakan Gurdal Maaike Goris Marry Duin Richard P. E. van Dokkum Hendrik Buikema Harry van Goor Robert H. Henning

Transactivation of epidermal growth factor receptor (EGFR) signaling by G protein–coupled receptors has been implicated in several cardiovascular (CV) conditions, including hypertension, heart failure, and cardiac and vascular hypertrophy. However, the therapeutic potential of EGFR inhibition in these conditions is currently unknown. The main objective of the present study was to investigate ca...

2005
John Marchesini Sean W. Smith

While PKI applications differ in how they use keys, all applications share one assumption: users have keypairs. In previous work, we established that desktop keystores are not safe places to store private keys, because the TCB is too large. These keystores are also immobile, difficult to use, and make it impossible for relying parties to make reasonable trust judgments. Since we would like to u...

2006
Björn Fay Jörn Schweisgut Christian Tobias

Identitätsbasierte Kryptografie wird häufig als Lösung angeführt, um den komplexen und aufwändigen Aufbau und Betrieb einer Public Key Infrastruktur (PKI) zu vermeiden. Als öffentliche Schlüssel eines Benutzers dienen bei identitätsbasierter Kryptografie persönliche (aber öffentlich zugängliche) Daten dieses Benutzers, wie beispielsweise seine E-Mail-Adresse oder seine Telefonnummer. Eine überp...

2006
ZORAN V. ŽIVKOVIĆ MILORAD J. STANOJEVIĆ BOŽIDAR RADENKOVIĆ

The modern approach to the electronically transactions security in ebusiness applications implies synthesized application of the cryptographic systems and mechanisms within the public key infrastructure (PKI). Digital certificate of an e-business subject (user) represents a cryptographic mechanism with the highest security level. Since every PKI transaction security has been based on the tempor...

Journal: :International Journal of Information Security 2004

Journal: :Jurnal Teknologi dan Sistem Komputer 2014

Journal: :Journal of Computer Security 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید