Results 11 to 20 of about 21,725 (207)
A decentralized dynamic PKI based on blockchain [PDF]
The central role of the certificate authority (CA) in traditional public key infrastructure (PKI) makes it fragile and prone to compromises and operational failures.
Mohsen Toorani, C. Gehrmann
semanticscholar +1 more source
Extension Mechanism of Overlay Network Protocol to Support Digital Authenticates [PDF]
Zero-trust security is a new security model that has recently received much attention. Since the model protects all resources, continuous authentication and authorization of resources are mandatory.
Kazushige Matama +3 more
doaj
This paper attempts to dismantle the pattern of trauma narratives developed in Indonesian literature by the second generation of the Pemberontakan PKI Madiun 1948. This second generation carries an Islamic narrative that is opposed to Communism.
Joko Santoso +2 more
doaj +1 more source
Cloud computing is a new consumption and delivery model for IT services. The cloud has become an attractive platform for enterprises to deploy and execute their business services for business to business (B2B) and government to government (G2G ...
Kashif Kifayat +2 more
doaj +1 more source
Machine Learning-Guided Repositioning of a SARS-CoV-2-Targeting Molecular Series as Cruzain Inhibitors. [PDF]
An ExtraTrees machine learning (ML) model is used to reposition a SARS‐CoV‐2‐directed library of peptidomimetic compounds as cruzain inhibitors for Chagas disease. Potent binders with a novel P1 moiety (for cruzain) are identified and validated by calorimetry.
Lameiro RF +10 more
europepmc +2 more sources
Cerpen-cerpen Lekra (1950—1965) sebagai strategi perjuangan politik PKI
This study aims to reveal the contents and objectives contained in Lekra's short stories, which were published in Harian Rakjat in 1950–1965. The data source for this research is in the form of short stories: Paman by L.S.
Ahmad Syafa'at Junaidi +2 more
doaj +1 more source
CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain [PDF]
In conventional PKI, CAs are assumed to be fully trusted. However, in practice, CAs' absolute responsibility for providing trustworthiness caused major security and privacy issues.
M. Kubilay, M. Kiraz, H. A. Mantar
semanticscholar +1 more source
MENGAIL DI AIR KERUH: GERAKAN PKI DI SULAWESI SELATAN 1950-1965
Abstrak Artikel ini dimaksudkan untuk menjelaskan gerakan PKI di Sulawesi Selatan tahun 1950 sampai 1965. Pokok persoalan dalam penelitian ini adalah bagaimana dinamika gerakan PKI di tengah buruknya situasi politik dan keamanan regional?
Taufik Ahmad
doaj +1 more source
An Adaptive Photovoltaic Topology to Overcome Shading Effect in PV Systems
Shading in photovoltaic systems can cause many undesired effects. When shading occurs, the power generated from the PV system is much less than nominal power, increasing the electrical mismatching losses between PV system components.
Mohamed Amer Chaaban +2 more
doaj +1 more source
Method of Anti-Virus Protection Based on (n, t) Threshold Proxy Signature with an Arbitrator
The article suggests the method of anti-virus protection of mobile devices based on the usage of proxy digital signatures and an (n;t)-threshold proxy signature scheme with an arbitrator.
E. A. Tolyupa
doaj +1 more source

