Results 161 to 170 of about 21,725 (207)
Some of the next articles are maybe not open access.

A Privacy-Aware PKI System Based on Permissioned Blockchains

2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS), 2018
Public key infrastructure (PKI) is the foundation and core of network security construction. Blockchain (BC) has many technical characteristics, such as decentralization, impossibility of being tampered with and forged, which makes it have incomparable ...
Rong Wang   +5 more
semanticscholar   +1 more source

Disaster Coverable PKI Model Utilizing the Existing PKI Structure

2006
A Public Key Infrastructure (PKI) using a certificate has already been widely used in a variety of fields for the provision of security service Accordingly a Certification Authority (CA) that issues a certificate must securely construct a Certification Authority System and manage it It is significantly important for a CA to ensure its service to ...
Bo Man Kim   +2 more
openaire   +1 more source

Blockchain Based DNS and PKI Solutions

IEEE Communications Standards Magazine, 2018
Domain name systems and certificate authority systems may have security and trust problems in their implementation. This article summarizes how these systems work and what the implementation problems may be.
Enis Karaarslan, Eylul Adiguzel
semanticscholar   +1 more source

User-centric PKI

Proceedings of the 7th symposium on Identity and trust on the Internet, 2008
The goal of supporting Single Sign-On to the Web has proven elusive. A number of solutions have been proposed -- and some have even been deployed -- but the capability remains unavailable to most users and the solutions deployed raise concerns for both convenience and security.
Radia Perlman, Charlie Kaufman
openaire   +1 more source

Classification of typical and atypical antipsychotic drugs on the basis of dopamine D-1, D-2 and serotonin2 pKi values.

Journal of Pharmacology and Experimental Therapeutics, 1989
The pKi values of 13 reference typical and 7 reference atypical antipsychotic drugs (APDs) for rat striatal dopamine D-1 and D-2 receptor binding sites and cortical serotonin (5-HT2) receptor binding sites were determined. The atypical antipsychotics had
H. Meltzer, S. Matsubara, J. C. Lee
semanticscholar   +1 more source

PKI in Practice

2013
In this chapter we present applications that use public key cryptography and PKIs. In these applications both PGP- and X.509-based infrastructures can be used. While X.509 is mostly used in commercial applications, PGP is popular in the private sector.
Johannes A. Buchmann   +2 more
openaire   +1 more source

PKI dies hard

Infosecurity Today, 2004
Abstract Public Key Infrastructure is staging a comeback, according to new research from European IT user association EEMA.
openaire   +1 more source

Evaluating Web PKIs

2017
Abstract Certificate authorities serve as trusted parties to help secure web communications. They are a vital component for ensuring the security of cloud infrastructures and big data repositories. Unfortunately, recent attacks using mis-issued certificates show that this model is severely broken. Much research has been done to enhance certificate
Jiangshan Yu, Mark Ryan
openaire   +1 more source

The Siemens PKI — Implementation of PKI Self Services

2004
The Siemens PKI, a global enterprise PKI with more than 200.000 users and 100.000 smart cards issued world-wide, was started in 1998/99. Deploying a PKI well-organized processes are a key success factor. Entering the second 3 years certificates life cycle in Siemens in 2002 managed re-keying via de-central Local Registration Authorities (LRAs) turned ...
openaire   +1 more source

Architectures PKI

2006
National ...
Dumas, Jean-Guillaume   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy