نتایج جستجو برای: pki
تعداد نتایج: 1556 فیلتر نتایج به سال:
This paper explores an Internet-based VPN solution, built upon IPSec, which combines tunneling with PKI authentication and encryption. To protect the valuable company resources, an efficient intrusion/misuse detection and response system was incorporated into deployed security solution. This approach enabled a large-scale customer provide their global e-business safely. As a result, an integrat...
Introduction Contrary to analysts’ forecasts we heard some years ago, PKI (public key infrastructure) has not become a widespread technology yet. An important reason for this is the insufficient usability PKI-enabled applications are often blamed for [11]. Users’ behavior has turned out to be the biggest risk in security software [10], so usability issues deserve closer attention. Research in t...
PURPOSE We determined whether blockade of the epidermal growth factor receptor (EGF-R) signaling pathway by oral administration of the EGF-R tyrosine kinase inhibitor (PKI 166) alone or in combination with injectable Taxol inhibits the growth of PC-3MM2 human prostate cancer cells in the bone of nude mice. EXPERIMENTAL DESIGN Male nude mice implanted with PC-3MM2 cells in the tibia were treat...
Transactivation of epidermal growth factor receptor (EGFR) signaling by G protein–coupled receptors has been implicated in several cardiovascular (CV) conditions, including hypertension, heart failure, and cardiac and vascular hypertrophy. However, the therapeutic potential of EGFR inhibition in these conditions is currently unknown. The main objective of the present study was to investigate ca...
While PKI applications differ in how they use keys, all applications share one assumption: users have keypairs. In previous work, we established that desktop keystores are not safe places to store private keys, because the TCB is too large. These keystores are also immobile, difficult to use, and make it impossible for relying parties to make reasonable trust judgments. Since we would like to u...
Identitätsbasierte Kryptografie wird häufig als Lösung angeführt, um den komplexen und aufwändigen Aufbau und Betrieb einer Public Key Infrastruktur (PKI) zu vermeiden. Als öffentliche Schlüssel eines Benutzers dienen bei identitätsbasierter Kryptografie persönliche (aber öffentlich zugängliche) Daten dieses Benutzers, wie beispielsweise seine E-Mail-Adresse oder seine Telefonnummer. Eine überp...
The modern approach to the electronically transactions security in ebusiness applications implies synthesized application of the cryptographic systems and mechanisms within the public key infrastructure (PKI). Digital certificate of an e-business subject (user) represents a cryptographic mechanism with the highest security level. Since every PKI transaction security has been based on the tempor...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید