Results 1 to 10 of about 23,446 (211)
Radiation is an important therapeutic strategy for hepatocellular (HCC). In this study, we evaluated the role of the dual PI3K/mTOR inhibitor, PKI-587, on radiosensitization of HCC and its possible mechanism.
Yinghai Xie +8 more
doaj +2 more sources
A Blockchain based PKI Validation System based on Rare Events Management
Public key infrastructures (PKIs) are the cornerstone for the security of the communication layer of online services relying on certificate-based authentication, such as e-commerce, e-government, online banking, cloud services, and many others.
Maurizio Talamo +3 more
doaj +2 more sources
A Semi-Decentralized PKI Based on Blockchain With a Stake-Based Reward-Punishment Mechanism
The conventional Public Key Infrastructure (PKI) has long been plagued by security issues stemming from its centralized and non-transparent design. In recent years, blockchain-based PKI architectures have emerged as promising solutions to overcome such ...
Erhan Turan, Sevil Sen, Tamer Ergun
doaj +2 more sources
RSA Keys Quality in a Real-world Organizational Certificate Dataset: a Practical Outlook [PDF]
This research investigates the intricacies of X.509 certificates within a comprehensive corporate infrastructure. Spanning over two decades, the examined enterprise has heavily depended on its internal certificate authority and Public Key Infrastructure (
Konrad Kamiński, Wojciech Mazurczyk
doaj +1 more source
Classification of Cushing's syndrome PKAc mutants based upon their ability to bind PKI.
Cushing's syndrome is an endocrine disorder caused by excess production of the stress hormone cortisol. Precision medicine strategies have identified single allele mutations within the PRKACA gene that drive adrenal Cushing's syndrome.
Mitchell H. Omar +7 more
semanticscholar +1 more source
This article presents brief life stories of select Indonesians who were forced into exile by the Suharto regime after the 1965 National Tragedy in Indonesia. It focuses on staunch nationalist exiles who were rendered stateless by the self-proclaimed “New
David T. Hill
doaj +1 more source
The decentralization feature of public and private blockchain-based applications is achieved by selecting different nodes as validators or Certificate Authority ( $CA$ ) for each transaction.
Amrutanshu Panigrahi +4 more
semanticscholar +1 more source
F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure [PDF]
We present F-PKI, an enhancement to the HTTPS public-key infrastructure (or web PKI) that gives trust flexibility to both clients and domain owners, and enables certification authorities (CAs) to enforce stronger security measures.
L. Chuat +3 more
semanticscholar +1 more source
Cloud computing is a new consumption and delivery model for IT services. The cloud has become an attractive platform for enterprises to deploy and execute their business services for business to business (B2B) and government to government (G2G ...
Kashif Kifayat +2 more
doaj +1 more source
Research on anonymous identity authentication technology in Fabric
Solving the privacy problem of users in the consortium blockchain becomes the key to accelerate the implementation of the practical application of blockchain. A set of anonymous identity authentication scheme based on PKI is designed based on Hyperledger
YE Yueyang, ZHANG Xinglan
doaj +1 more source

