Results 11 to 20 of about 23,446 (211)

A decentralized dynamic PKI based on blockchain [PDF]

open access: yesACM Symposium on Applied Computing, 2020
The central role of the certificate authority (CA) in traditional public key infrastructure (PKI) makes it fragile and prone to compromises and operational failures.
Mohsen Toorani, C. Gehrmann
semanticscholar   +1 more source

Extension Mechanism of Overlay Network Protocol to Support Digital Authenticates [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2023
Zero-trust security is a new security model that has recently received much attention. Since the model protects all resources, continuous authentication and authorization of resources are mandatory.
Kazushige Matama   +3 more
doaj  

Traumatic narrative of the pemberontakan PKI Madiun 1948 in the Ayat-Ayat yang Disembelih by Anaf Afifi and Thowaf Zuharon: A postmemory study

open access: yesBahastra, 2023
This paper attempts to dismantle the pattern of trauma narratives developed in Indonesian literature by the second generation of the Pemberontakan PKI Madiun 1948. This second generation carries an Islamic narrative that is opposed to Communism.
Joko Santoso   +2 more
doaj   +1 more source

Cerpen-cerpen Lekra (1950—1965) sebagai strategi perjuangan politik PKI

open access: yesDiglosia, 2023
This study aims to reveal the contents and objectives contained in Lekra's short stories, which were published in Harian Rakjat in 1950–1965. The data source for this research is in the form of short stories: Paman by L.S.
Ahmad Syafa'at Junaidi   +2 more
doaj   +1 more source

MENGAIL DI AIR KERUH: GERAKAN PKI DI SULAWESI SELATAN 1950-1965

open access: yesPatanjala: Jurnal Penelitian Sejarah dan Budaya, 2014
Abstrak Artikel ini dimaksudkan untuk menjelaskan gerakan PKI di Sulawesi Selatan tahun 1950 sampai 1965. Pokok persoalan dalam penelitian ini adalah bagaimana dinamika gerakan PKI di tengah buruknya situasi politik dan keamanan regional?
Taufik Ahmad
doaj   +1 more source

Method of Anti-Virus Protection Based on (n, t) Threshold Proxy Signature with an Arbitrator

open access: yesМоделирование и анализ информационных систем, 2014
The article suggests the method of anti-virus protection of mobile devices based on the usage of proxy digital signatures and an (n;t)-threshold proxy signature scheme with an arbitrator.
E. A. Tolyupa
doaj   +1 more source

The Kinase Specificity of Protein Kinase Inhibitor Peptide

open access: yesFrontiers in Pharmacology, 2021
G-protein-coupled-receptor (GPCR) signaling is exquisitely controlled to achieve spatial and temporal specificity. The endogenous protein kinase inhibitor peptide (PKI) confines the spatial and temporal spread of the activity of protein kinase A (PKA ...
Yao Chen, Yao Chen, Bernardo L. Sabatini
doaj   +1 more source

An Adaptive Photovoltaic Topology to Overcome Shading Effect in PV Systems

open access: yesInternational Journal of Photoenergy, 2015
Shading in photovoltaic systems can cause many undesired effects. When shading occurs, the power generated from the PV system is much less than nominal power, increasing the electrical mismatching losses between PV system components.
Mohamed Amer Chaaban   +2 more
doaj   +1 more source

Research on Application of Blockchain in PKI Security [PDF]

open access: yesJisuanji kexue yu tansuo
The design idea of emphasizing application and neglecting defense leads to the lack of endogenous security attributes at the beginning of the design of transmission control protocol/Internet protocol (TCP/IP) architecture. Public key infrastructure (PKI),
XIA Lingling, WANG Qun, MA Zhuo, LIANG Guangjun
doaj   +1 more source

Multi-state recognition pathway of the intrinsically disordered protein kinase inhibitor by protein kinase A

open access: yeseLife, 2020
In the nucleus, the spatiotemporal regulation of the catalytic subunit of cAMP-dependent protein kinase A (PKA-C) is orchestrated by an intrinsically disordered protein kinase inhibitor, PKI, which recruits the CRM1/RanGTP nuclear exporting complex.
Cristina Olivieri   +13 more
doaj   +1 more source

Home - About - Disclaimer - Privacy