Results 1 to 10 of about 65,702 (193)

PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem [PDF]

open access: green, 2016
In a public-key infrastructure (PKI), clients must have an efficient and secure way to determine whether a certificate was revoked (by an entity considered as legitimate to do so), while preserving user privacy.
Chuat, Laurent   +2 more
core   +2 more sources

PKI Interoperability: Still an Issue? A Solution in the X. 509 Realm [PDF]

open access: yes, 2013
There exist many obstacles that slow the global adoption of public key infrastructure (PKI) technology. The PKI interoperability problem, being poorly understood, is one of the most confusing.
A. Martínez-Nadal   +7 more
core   +2 more sources

X.509 certificate error testing [PDF]

open access: yes, 2018
X.509 Certificates are used by a wide range of technologies to verify identities, while the SSL protocol is used to provide a secure encrypted tunnel through which data can be sent over a public network.
Jimenez M., Momani E. M. H., Toma C
core   +2 more sources

Efficient asynchronous accumulators for distributed PKI [PDF]

open access: yes, 2016
Cryptographic accumulators are a tool for compact set representation and secure set membership proofs. When an element is added to a set by means of an accumulator, a membership witness is generated. This witness can later be used to prove the membership
Yakoubov, Sophia
core   +2 more sources

MixEth: Efficient, Trustless Coin Mixing Service for Ethereum [PDF]

open access: yes, 2020
Coin mixing is a prevalent privacy-enhancing technology for cryptocurrency users. In this paper, we present MixEth, which is a trustless coin mixing service for Turing-complete blockchains.
, , Buckland, Chris
core   +1 more source

Post-Keynesian institutionalism after the great recession [PDF]

open access: yes, 2012
This paper surveys the context and contours of contemporary Post-Keynesian Institutionalism (PKI). It begins by reviewing recent criticism of conventional economics by prominent economists as well as examining, within the current context, important ...
Whalen, Charles J.
core   +2 more sources

Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security [PDF]

open access: yes, 2009
Recently, a variant of proxy re-encryption, named conditional proxy re-encryption (C-PRE), has been introduced. Compared with traditional proxy re-encryption, C-PRE enables the delegator to implement fine-grained delegation of decryption rights, and thus
B. Libert   +15 more
core   +5 more sources

An almost cyclic 2-coordinate descent method for singly linearly constrained problems [PDF]

open access: yes, 2019
A block decomposition method is proposed for minimizing a (possibly non-convex) continuously differentiable function subject to one linear equality constraint and simple bounds on the variables.
Cristofari, Andrea
core   +2 more sources

Kinetics and Inhibition Studies of the L205R Mutant of cAMP-Dependent Protein Kinase Involved in Cushing’s Syndrome [PDF]

open access: yes, 2018
Overproduction of cortisol by the hypothalamus–pituitary–adrenal hormone system results in the clinical disorder known as Cushing\u27s syndrome. Genomics studies have identified a key mutation (L205R) in the α‐isoform of the catalytic subunit of cAMP ...
Ellis, Keith C.   +3 more
core   +2 more sources

Elevated intracellular cAMP exacerbates vulnerability to oxidative stress in optic nerve head astrocytes. [PDF]

open access: yes, 2018
Glaucoma is characterized by a progressive loss of retinal ganglion cells and their axons, but the underlying biological basis for the accompanying neurodegeneration is not known.
Bu, Jung Hyun   +8 more
core   +2 more sources

Home - About - Disclaimer - Privacy