Results 11 to 20 of about 65,702 (193)
RSA Keys Quality in a Real-world Organizational Certificate Dataset: a Practical Outlook [PDF]
This research investigates the intricacies of X.509 certificates within a comprehensive corporate infrastructure. Spanning over two decades, the examined enterprise has heavily depended on its internal certificate authority and Public Key Infrastructure (
Konrad Kamiński, Wojciech Mazurczyk
doaj +1 more source
This article presents brief life stories of select Indonesians who were forced into exile by the Suharto regime after the 1965 National Tragedy in Indonesia. It focuses on staunch nationalist exiles who were rendered stateless by the self-proclaimed “New
David T. Hill
doaj +1 more source
Cloud computing is a new consumption and delivery model for IT services. The cloud has become an attractive platform for enterprises to deploy and execute their business services for business to business (B2B) and government to government (G2G ...
Kashif Kifayat +2 more
doaj +1 more source
Research on anonymous identity authentication technology in Fabric
Solving the privacy problem of users in the consortium blockchain becomes the key to accelerate the implementation of the practical application of blockchain. A set of anonymous identity authentication scheme based on PKI is designed based on Hyperledger
YE Yueyang, ZHANG Xinglan
doaj +1 more source
Extension Mechanism of Overlay Network Protocol to Support Digital Authenticates [PDF]
Zero-trust security is a new security model that has recently received much attention. Since the model protects all resources, continuous authentication and authorization of resources are mandatory.
Kazushige Matama +3 more
doaj
This paper attempts to dismantle the pattern of trauma narratives developed in Indonesian literature by the second generation of the Pemberontakan PKI Madiun 1948. This second generation carries an Islamic narrative that is opposed to Communism.
Joko Santoso +2 more
doaj +1 more source
Cerpen-cerpen Lekra (1950—1965) sebagai strategi perjuangan politik PKI
This study aims to reveal the contents and objectives contained in Lekra's short stories, which were published in Harian Rakjat in 1950–1965. The data source for this research is in the form of short stories: Paman by L.S.
Ahmad Syafa'at Junaidi +2 more
doaj +1 more source
MENGAIL DI AIR KERUH: GERAKAN PKI DI SULAWESI SELATAN 1950-1965
Abstrak Artikel ini dimaksudkan untuk menjelaskan gerakan PKI di Sulawesi Selatan tahun 1950 sampai 1965. Pokok persoalan dalam penelitian ini adalah bagaimana dinamika gerakan PKI di tengah buruknya situasi politik dan keamanan regional?
Taufik Ahmad
doaj +1 more source
A Blockchain based PKI Validation System based on Rare Events Management
Public key infrastructures (PKIs) are the cornerstone for the security of the communication layer of online services relying on certificate-based authentication, such as e-commerce, e-government, online banking, cloud services, and many others.
Maurizio Talamo +3 more
doaj +1 more source
Method of Anti-Virus Protection Based on (n, t) Threshold Proxy Signature with an Arbitrator
The article suggests the method of anti-virus protection of mobile devices based on the usage of proxy digital signatures and an (n;t)-threshold proxy signature scheme with an arbitrator.
E. A. Tolyupa
doaj +1 more source

