نتایج جستجو برای: pki

تعداد نتایج: 1556  

Journal: :Queue 2006

در سال­های اخیر برای حل مشکل توزیع کلید و تعداد زیاد کلیدهای ذخیره شده در شبکه‌های حسگر بی‌سیم از رمزنگاری کلید عمومی استفاده شد. در این شبکه‌ها از ین نوع رمزنگاری برای انجام احراز اصالت و توافق کلید بهره گرفته شده است. پر کاربردترین رمزنگاری کلید عمومی که  مبتنی بر گواهی است از زیر ساخت ‏کلید عمومی (PKI) استفاده می‌کند. همان طور که می‌دانیم برای پیاده‌‌سازی PKI نیازمند میزان قابل توجهی حافظه، ...

Journal: :Digital Evidence and Electronic Signature Law Review 2022

Abstract 
 In a bid to implement the Electronic Transactions Act 2015, Tanzania initiated adoption of National Public Key infrastructure (PKI) framework. However, plan has not been executed as expected because certain gaps and ambiguities in laws. This article examines existing laws providing for legal validity, admissibility enforceability electronic signatures especially using PKI; ident...

پایان نامه :وزارت بهداشت، درمان و آموزش پزشکی - دانشگاه علوم پزشکی و خدمات بهداشتی درمانی تهران 1347

چکیده ندارد.

Journal: :American journal of physiology. Cell physiology 2002
Hazel Lum Zengping Hao Dave Gayle Priyadarsini Kumar Carolyn E Patterson Michael D Uhler

The expression and function of the endogenous inhibitor of cAMP-dependent protein kinase (PKI) in endothelial cells are unknown. In this study, overexpression of rabbit muscle PKI gene into endothelial cells inhibited the cAMP-mediated increase and exacerbated thrombin-induced decrease in endothelial barrier function. We investigated PKI expression in human pulmonary artery (HPAECs), foreskin m...

Journal: :The Journal of the Institute of Image Information and Television Engineers 2003

2012
Anup Bhattacharya Abhijit Das Dipanwita Roy Chowdhury Aravind Iyer Debojyoti Bhattacharya

Privacy and authenticity are two essential security attributes of secure Vehicle-to-Vehicle communications. Pseudonymous Public Key Infrastructure (PPKI), an extension of standard PKI, has been proposed to achieve these security attributes. In Pseudonymous PKI, a user needs certificates or pseudonyms periodically from the Certificate Authority (CA) to authenticate messages anonymously. But the ...

Journal: :CoRR 2009
Nasir Mahmood Malik Tehmina Khalil Samina Khalid Faisal Munir Malik

The paper includes Public Key Infrastructure (PKI), its need and requirements and introduction of some renowned PKI products. However, the major thrust of this work is that how PKI can enhance security of various systems. The paper is intended to serve as a guide on how to adequately prepare for some of the challenges that may be encountered especially in developing countries like Pakistan. The...

Journal: :Brazilian Keynesian Review 2023

Post-Keynesian institutionalism (PKI)—a branch of the (original) institutionalist school that builds on common ground with post-Keynesianism—constitutes a robust tradition secure foundations and broad methodological, analytical, policy contours. Since its emergence in 1980s, has consistently been ahead economic mainstream shedding light real-world problems. Drawing work various heterodox econom...

2015
Louise Axon

Conventional public key infrastructure (PKI) designs are not optimal and contain security flaws; there is much work underway in improving PKI. The properties given by the Bitcoin blockchain and its derivatives are a natural solution to some of the problems with PKI in particular, certificate transparency and elimination of single points of failure. Recently-proposed blockchain PKI designs are b...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید