Results 11 to 20 of about 65,702 (193)

RSA Keys Quality in a Real-world Organizational Certificate Dataset: a Practical Outlook [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2023
This research investigates the intricacies of X.509 certificates within a comprehensive corporate infrastructure. Spanning over two decades, the examined enterprise has heavily depended on its internal certificate authority and Public Key Infrastructure (
Konrad Kamiński, Wojciech Mazurczyk
doaj   +1 more source

Indonesian political exiles in the Netherlands after 1965; Postcolonial nationalists in an era of transnationalism

open access: yesWacana: Journal of the Humanities of Indonesia, 2022
This article presents brief life stories of select Indonesians who were forced into exile by the Suharto regime after the 1965 National Tragedy in Indonesia. It focuses on staunch nationalist exiles who were rendered stateless by the self-proclaimed “New
David T. Hill
doaj   +1 more source

Trusted Cloud Computing [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2012
Cloud computing is a new consumption and delivery model for IT services. The cloud has become an attractive platform for enterprises to deploy and execute their business services for business to business (B2B) and government to government (G2G ...
Kashif Kifayat   +2 more
doaj   +1 more source

Research on anonymous identity authentication technology in Fabric

open access: yes网络与信息安全学报, 2021
Solving the privacy problem of users in the consortium blockchain becomes the key to accelerate the implementation of the practical application of blockchain. A set of anonymous identity authentication scheme based on PKI is designed based on Hyperledger
YE Yueyang, ZHANG Xinglan
doaj   +1 more source

Extension Mechanism of Overlay Network Protocol to Support Digital Authenticates [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2023
Zero-trust security is a new security model that has recently received much attention. Since the model protects all resources, continuous authentication and authorization of resources are mandatory.
Kazushige Matama   +3 more
doaj  

Traumatic narrative of the pemberontakan PKI Madiun 1948 in the Ayat-Ayat yang Disembelih by Anaf Afifi and Thowaf Zuharon: A postmemory study

open access: yesBahastra, 2023
This paper attempts to dismantle the pattern of trauma narratives developed in Indonesian literature by the second generation of the Pemberontakan PKI Madiun 1948. This second generation carries an Islamic narrative that is opposed to Communism.
Joko Santoso   +2 more
doaj   +1 more source

Cerpen-cerpen Lekra (1950—1965) sebagai strategi perjuangan politik PKI

open access: yesDiglosia, 2023
This study aims to reveal the contents and objectives contained in Lekra's short stories, which were published in Harian Rakjat in 1950–1965. The data source for this research is in the form of short stories: Paman by L.S.
Ahmad Syafa'at Junaidi   +2 more
doaj   +1 more source

MENGAIL DI AIR KERUH: GERAKAN PKI DI SULAWESI SELATAN 1950-1965

open access: yesPatanjala: Jurnal Penelitian Sejarah dan Budaya, 2014
Abstrak Artikel ini dimaksudkan untuk menjelaskan gerakan PKI di Sulawesi Selatan tahun 1950 sampai 1965. Pokok persoalan dalam penelitian ini adalah bagaimana dinamika gerakan PKI di tengah buruknya situasi politik dan keamanan regional?
Taufik Ahmad
doaj   +1 more source

A Blockchain based PKI Validation System based on Rare Events Management

open access: yesFuture Internet, 2020
Public key infrastructures (PKIs) are the cornerstone for the security of the communication layer of online services relying on certificate-based authentication, such as e-commerce, e-government, online banking, cloud services, and many others.
Maurizio Talamo   +3 more
doaj   +1 more source

Method of Anti-Virus Protection Based on (n, t) Threshold Proxy Signature with an Arbitrator

open access: yesМоделирование и анализ информационных систем, 2014
The article suggests the method of anti-virus protection of mobile devices based on the usage of proxy digital signatures and an (n;t)-threshold proxy signature scheme with an arbitrator.
E. A. Tolyupa
doaj   +1 more source

Home - About - Disclaimer - Privacy