Results 171 to 180 of about 21,725 (207)
Some of the next articles are maybe not open access.
2013
A PKI can be described as a set of technologies, procedures, and policies for propagating trust from where it initially exists to where it is needed for authentication in online environments. How the trust propagation takes place under a specific PKI depends on the PKI’s syntactic trust structure, which is commonly known as a trust model.
openaire +1 more source
A PKI can be described as a set of technologies, procedures, and policies for propagating trust from where it initially exists to where it is needed for authentication in online environments. How the trust propagation takes place under a specific PKI depends on the PKI’s syntactic trust structure, which is commonly known as a trust model.
openaire +1 more source
2014
Implementing and managing a Public Key Infrastructure (PKI) is a complex undertaking which can prove extremely challenging. While there exist software tools to aid the task, such an undertaking can prove troublesome and time consuming if not approached sensibly.
openaire +1 more source
Implementing and managing a Public Key Infrastructure (PKI) is a complex undertaking which can prove extremely challenging. While there exist software tools to aid the task, such an undertaking can prove troublesome and time consuming if not approached sensibly.
openaire +1 more source
2011
Several National Research and Education Networks associated in TERENA have joined their efforts to build a shared PKI able to serve potentially millions of users from their constituency. The TCS eScience Personal CA takes advantage of national identity federations to facilitate user identity vetting and enrollment procedures.
openaire +1 more source
Several National Research and Education Networks associated in TERENA have joined their efforts to build a shared PKI able to serve potentially millions of users from their constituency. The TCS eScience Personal CA takes advantage of national identity federations to facilitate user identity vetting and enrollment procedures.
openaire +1 more source
SCPKI: A Smart Contract-based PKI and Identity System
, 2017Mustafa Al-Bassam
semanticscholar +1 more source
IKP: Turning a PKI Around with Decentralized Automated Incentives
IEEE Symposium on Security and Privacy, 2017S. Matsumoto, Raphael M. Reischuk
semanticscholar +1 more source

