Results 11 to 20 of about 21,725 (207)

A decentralized dynamic PKI based on blockchain [PDF]

open access: yesACM Symposium on Applied Computing, 2020
The central role of the certificate authority (CA) in traditional public key infrastructure (PKI) makes it fragile and prone to compromises and operational failures.
Mohsen Toorani, C. Gehrmann
semanticscholar   +1 more source

Extension Mechanism of Overlay Network Protocol to Support Digital Authenticates [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2023
Zero-trust security is a new security model that has recently received much attention. Since the model protects all resources, continuous authentication and authorization of resources are mandatory.
Kazushige Matama   +3 more
doaj  

Traumatic narrative of the pemberontakan PKI Madiun 1948 in the Ayat-Ayat yang Disembelih by Anaf Afifi and Thowaf Zuharon: A postmemory study

open access: yesBahastra, 2023
This paper attempts to dismantle the pattern of trauma narratives developed in Indonesian literature by the second generation of the Pemberontakan PKI Madiun 1948. This second generation carries an Islamic narrative that is opposed to Communism.
Joko Santoso   +2 more
doaj   +1 more source

Trusted Cloud Computing [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2012
Cloud computing is a new consumption and delivery model for IT services. The cloud has become an attractive platform for enterprises to deploy and execute their business services for business to business (B2B) and government to government (G2G ...
Kashif Kifayat   +2 more
doaj   +1 more source

Machine Learning-Guided Repositioning of a SARS-CoV-2-Targeting Molecular Series as Cruzain Inhibitors. [PDF]

open access: yesChemMedChem
An ExtraTrees machine learning (ML) model is used to reposition a SARS‐CoV‐2‐directed library of peptidomimetic compounds as cruzain inhibitors for Chagas disease. Potent binders with a novel P1 moiety (for cruzain) are identified and validated by calorimetry.
Lameiro RF   +10 more
europepmc   +2 more sources

Cerpen-cerpen Lekra (1950—1965) sebagai strategi perjuangan politik PKI

open access: yesDiglosia, 2023
This study aims to reveal the contents and objectives contained in Lekra's short stories, which were published in Harian Rakjat in 1950–1965. The data source for this research is in the form of short stories: Paman by L.S.
Ahmad Syafa'at Junaidi   +2 more
doaj   +1 more source

CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain [PDF]

open access: yesIACR Cryptology ePrint Archive, 2018
In conventional PKI, CAs are assumed to be fully trusted. However, in practice, CAs' absolute responsibility for providing trustworthiness caused major security and privacy issues.
M. Kubilay, M. Kiraz, H. A. Mantar
semanticscholar   +1 more source

MENGAIL DI AIR KERUH: GERAKAN PKI DI SULAWESI SELATAN 1950-1965

open access: yesPatanjala: Jurnal Penelitian Sejarah dan Budaya, 2014
Abstrak Artikel ini dimaksudkan untuk menjelaskan gerakan PKI di Sulawesi Selatan tahun 1950 sampai 1965. Pokok persoalan dalam penelitian ini adalah bagaimana dinamika gerakan PKI di tengah buruknya situasi politik dan keamanan regional?
Taufik Ahmad
doaj   +1 more source

An Adaptive Photovoltaic Topology to Overcome Shading Effect in PV Systems

open access: yesInternational Journal of Photoenergy, 2015
Shading in photovoltaic systems can cause many undesired effects. When shading occurs, the power generated from the PV system is much less than nominal power, increasing the electrical mismatching losses between PV system components.
Mohamed Amer Chaaban   +2 more
doaj   +1 more source

Method of Anti-Virus Protection Based on (n, t) Threshold Proxy Signature with an Arbitrator

open access: yesМоделирование и анализ информационных систем, 2014
The article suggests the method of anti-virus protection of mobile devices based on the usage of proxy digital signatures and an (n;t)-threshold proxy signature scheme with an arbitrator.
E. A. Tolyupa
doaj   +1 more source

Home - About - Disclaimer - Privacy