Results 11 to 20 of about 64,904 (211)

PKI Scalability Issues

open access: yes, 2004
This report surveys different PKI technologies such as PKIX and SPKI and the issues of PKI that affect scalability. Much focus is spent on certificate revocation methodologies and status verification systems such as CRLs, Delta-CRLs, CRS, Certificate Revocation Trees, Windowed Certificate Revocation, OCSP, SCVP and DVCS.
Slagell, Adam J, Bonilla, Rafael
openaire   +5 more sources

PKI Interoperability: Still an Issue? A Solution in the X. 509 Realm [PDF]

open access: yes, 2013
There exist many obstacles that slow the global adoption of public key infrastructure (PKI) technology. The PKI interoperability problem, being poorly understood, is one of the most confusing.
A. Martínez-Nadal   +7 more
core   +2 more sources

ViotSOC: Controlling Access to Dynamically Virtualized IoT Services using Service Object Capability [PDF]

open access: yes, 2017
Virtualization of Internet of Things(IoT) is a concept of dynamically building customized high-level IoT services which rely on the real time data streams from low-level physical IoT sensors.
Jin, Jiong, Keoh, Sye Loong, Ko, Hajoon
core   +1 more source

X.509 certificate error testing [PDF]

open access: yes, 2018
X.509 Certificates are used by a wide range of technologies to verify identities, while the SSL protocol is used to provide a secure encrypted tunnel through which data can be sent over a public network.
Jimenez M., Momani E. M. H., Toma C
core   +2 more sources

MixEth: Efficient, Trustless Coin Mixing Service for Ethereum [PDF]

open access: yes, 2020
Coin mixing is a prevalent privacy-enhancing technology for cryptocurrency users. In this paper, we present MixEth, which is a trustless coin mixing service for Turing-complete blockchains.
, , Buckland, Chris
core   +1 more source

Method of Anti-Virus Protection Based on (n, t) Threshold Proxy Signature with an Arbitrator

open access: yesМоделирование и анализ информационных систем, 2014
The article suggests the method of anti-virus protection of mobile devices based on the usage of proxy digital signatures and an (n;t)-threshold proxy signature scheme with an arbitrator.
E. A. Tolyupa
doaj   +1 more source

An Adaptive Photovoltaic Topology to Overcome Shading Effect in PV Systems

open access: yesInternational Journal of Photoenergy, 2015
Shading in photovoltaic systems can cause many undesired effects. When shading occurs, the power generated from the PV system is much less than nominal power, increasing the electrical mismatching losses between PV system components.
Mohamed Amer Chaaban   +2 more
doaj   +1 more source

PB-PKI: A Privacy-aware Blockchain-based PKI

open access: yesProceedings of the 14th International Joint Conference on e-Business and Telecommunications, 2017
Conventional public-key infrastructure (PKI) designs using certificate authorities and web-of-trust are not optimal and have security flaws. The properties afforded by the Bitcoin blockchain are a natural solution to some of the problems with PKI - in particular, certificate transparency and elimination of single points-offailure.
Axon, L, Goldsmith, M
openaire   +2 more sources

The Kinase Specificity of Protein Kinase Inhibitor Peptide

open access: yesFrontiers in Pharmacology, 2021
G-protein-coupled-receptor (GPCR) signaling is exquisitely controlled to achieve spatial and temporal specificity. The endogenous protein kinase inhibitor peptide (PKI) confines the spatial and temporal spread of the activity of protein kinase A (PKA ...
Yao Chen, Yao Chen, Bernardo L. Sabatini
doaj   +1 more source

Efficient asynchronous accumulators for distributed PKI [PDF]

open access: yes, 2016
Cryptographic accumulators are a tool for compact set representation and secure set membership proofs. When an element is added to a set by means of an accumulator, a membership witness is generated. This witness can later be used to prove the membership
Yakoubov, Sophia
core   +2 more sources

Home - About - Disclaimer - Privacy