Results 61 to 70 of about 1,424,934 (394)

X.509 certificate error testing [PDF]

open access: yes, 2018
X.509 Certificates are used by a wide range of technologies to verify identities, while the SSL protocol is used to provide a secure encrypted tunnel through which data can be sent over a public network.
Jimenez M., Momani E. M. H., Toma C
core   +2 more sources

Legal Protection for Buyers Against Cancellation of The Certificate of Land Rights Due to Administrative Defects

open access: yesAlauddin Law Development Journal
The purpose of this research is to analyze the position of land rights certificates which were canceled by BPN due to administrative defects related to the status of land rights and legal protection for buyer.
Moch Januar Ramadani   +2 more
doaj   +1 more source

Good prospects for green energy in Romania [PDF]

open access: yesGlobal Economic Observer, 2013
EU has to attain the strategic objectives for 2020: 20% of energy from renewable sources, cutting the emissions of greenhouse gases by 20% and diminishing the dependence on imported fuels, that is why in the last years European Commission has decided ...
Mariana Papatulica, Petre Prisecaru
doaj  

Multidimensional Security Provision for Secure Communication in Vehicular Ad Hoc Networks Using Hierarchical Structure and End-to-End Authentication

open access: yesIEEE Access, 2018
Vehicular ad hoc networks (VANETs) have been considered as one of the most influential applications of mobile ad hoc networks. The VANETs have also become an important part of Internet of Things.
Gulshan Kumar   +3 more
doaj   +1 more source

Non-Invertible Public Key Certificates

open access: yesEntropy, 2021
Post-quantum public cryptosystems introduced so far do not define a scalable public key infrastructure for the quantum era. We demonstrate here a public certification system based on Lizama’s non-invertible key exchange protocol which can be used to ...
Luis Adrián Lizama-Perez   +1 more
doaj   +1 more source

Transcriptional network analysis of PTEN‐protein‐deficient prostate tumors reveals robust stromal reprogramming and signs of senescent paracrine communication

open access: yesMolecular Oncology, EarlyView.
Combining PTEN protein assessment and transcriptomic profiling of prostate tumors, we uncovered a network enriched in senescence and extracellular matrix (ECM) programs associated with PTEN loss and conserved in a mouse model. We show that PTEN‐deficient cells trigger paracrine remodeling of the surrounding stroma and this information could help ...
Ivana Rondon‐Lorefice   +16 more
wiley   +1 more source

Towards the Integration of an Intuitionistic First-Order Prover into Coq

open access: yes, 2016
An efficient intuitionistic first-order prover integrated into Coq is useful to replay proofs found by external automated theorem provers. We propose a two-phase approach: An intuitionistic prover generates a certificate based on the matrix ...
Kunze, Fabian
core   +2 more sources

CONSIDERATIONS REGARDING THE DIVORCE BY AGREEMENT OF THE SPOUSES, ACCORDING TO THE NOTARY PROCEDURE [PDF]

open access: yesChallenges of the Knowledge Society, 2011
By amending the Family Code according to the provisions of the Law no. 202/2010 regarding some measures in order to speed the solving of processes (“Law of small reform”), representing the introduction to the New Civil Code adopted by the Law no.
ANCA-ANDREEA NISTOREANU
doaj  

Developing evidence‐based, cost‐effective P4 cancer medicine for driving innovation in prevention, therapeutics, patient care and reducing healthcare inequalities

open access: yesMolecular Oncology, EarlyView.
The cancer problem is increasing globally with projections up to the year 2050 showing unfavourable outcomes in terms of incidence and cancer‐related deaths. The main challenges are prevention, improved therapeutics resulting in increased cure rates and enhanced health‐related quality of life.
Ulrik Ringborg   +43 more
wiley   +1 more source

Certificate Transparency in the Wild: Exploring the Reliability of Monitors

open access: yesConference on Computer and Communications Security, 2019
To detect fraudulent TLS server certificates and improve the accountability of certification authorities (CAs), certificate transparency (CT) is proposed to record certificates in publicly-visible logs, from which the monitors fetch all certificates and ...
Bingyu Li   +6 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy