Results 161 to 170 of about 21,725 (207)
Some of the next articles are maybe not open access.
A Privacy-Aware PKI System Based on Permissioned Blockchains
2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS), 2018Public key infrastructure (PKI) is the foundation and core of network security construction. Blockchain (BC) has many technical characteristics, such as decentralization, impossibility of being tampered with and forged, which makes it have incomparable ...
Rong Wang +5 more
semanticscholar +1 more source
Disaster Coverable PKI Model Utilizing the Existing PKI Structure
2006A Public Key Infrastructure (PKI) using a certificate has already been widely used in a variety of fields for the provision of security service Accordingly a Certification Authority (CA) that issues a certificate must securely construct a Certification Authority System and manage it It is significantly important for a CA to ensure its service to ...
Bo Man Kim +2 more
openaire +1 more source
Blockchain Based DNS and PKI Solutions
IEEE Communications Standards Magazine, 2018Domain name systems and certificate authority systems may have security and trust problems in their implementation. This article summarizes how these systems work and what the implementation problems may be.
Enis Karaarslan, Eylul Adiguzel
semanticscholar +1 more source
Proceedings of the 7th symposium on Identity and trust on the Internet, 2008
The goal of supporting Single Sign-On to the Web has proven elusive. A number of solutions have been proposed -- and some have even been deployed -- but the capability remains unavailable to most users and the solutions deployed raise concerns for both convenience and security.
Radia Perlman, Charlie Kaufman
openaire +1 more source
The goal of supporting Single Sign-On to the Web has proven elusive. A number of solutions have been proposed -- and some have even been deployed -- but the capability remains unavailable to most users and the solutions deployed raise concerns for both convenience and security.
Radia Perlman, Charlie Kaufman
openaire +1 more source
Journal of Pharmacology and Experimental Therapeutics, 1989
The pKi values of 13 reference typical and 7 reference atypical antipsychotic drugs (APDs) for rat striatal dopamine D-1 and D-2 receptor binding sites and cortical serotonin (5-HT2) receptor binding sites were determined. The atypical antipsychotics had
H. Meltzer, S. Matsubara, J. C. Lee
semanticscholar +1 more source
The pKi values of 13 reference typical and 7 reference atypical antipsychotic drugs (APDs) for rat striatal dopamine D-1 and D-2 receptor binding sites and cortical serotonin (5-HT2) receptor binding sites were determined. The atypical antipsychotics had
H. Meltzer, S. Matsubara, J. C. Lee
semanticscholar +1 more source
2013
In this chapter we present applications that use public key cryptography and PKIs. In these applications both PGP- and X.509-based infrastructures can be used. While X.509 is mostly used in commercial applications, PGP is popular in the private sector.
Johannes A. Buchmann +2 more
openaire +1 more source
In this chapter we present applications that use public key cryptography and PKIs. In these applications both PGP- and X.509-based infrastructures can be used. While X.509 is mostly used in commercial applications, PGP is popular in the private sector.
Johannes A. Buchmann +2 more
openaire +1 more source
Infosecurity Today, 2004
Abstract Public Key Infrastructure is staging a comeback, according to new research from European IT user association EEMA.
openaire +1 more source
Abstract Public Key Infrastructure is staging a comeback, according to new research from European IT user association EEMA.
openaire +1 more source
2017
Abstract Certificate authorities serve as trusted parties to help secure web communications. They are a vital component for ensuring the security of cloud infrastructures and big data repositories. Unfortunately, recent attacks using mis-issued certificates show that this model is severely broken. Much research has been done to enhance certificate
Jiangshan Yu, Mark Ryan
openaire +1 more source
Abstract Certificate authorities serve as trusted parties to help secure web communications. They are a vital component for ensuring the security of cloud infrastructures and big data repositories. Unfortunately, recent attacks using mis-issued certificates show that this model is severely broken. Much research has been done to enhance certificate
Jiangshan Yu, Mark Ryan
openaire +1 more source
The Siemens PKI — Implementation of PKI Self Services
2004The Siemens PKI, a global enterprise PKI with more than 200.000 users and 100.000 smart cards issued world-wide, was started in 1998/99. Deploying a PKI well-organized processes are a key success factor. Entering the second 3 years certificates life cycle in Siemens in 2002 managed re-keying via de-central Local Registration Authorities (LRAs) turned ...
openaire +1 more source

