Results 11 to 20 of about 64,904 (211)
This report surveys different PKI technologies such as PKIX and SPKI and the issues of PKI that affect scalability. Much focus is spent on certificate revocation methodologies and status verification systems such as CRLs, Delta-CRLs, CRS, Certificate Revocation Trees, Windowed Certificate Revocation, OCSP, SCVP and DVCS.
Slagell, Adam J, Bonilla, Rafael
openaire +5 more sources
PKI Interoperability: Still an Issue? A Solution in the X. 509 Realm [PDF]
There exist many obstacles that slow the global adoption of public key infrastructure (PKI) technology. The PKI interoperability problem, being poorly understood, is one of the most confusing.
A. Martínez-Nadal +7 more
core +2 more sources
ViotSOC: Controlling Access to Dynamically Virtualized IoT Services using Service Object Capability [PDF]
Virtualization of Internet of Things(IoT) is a concept of dynamically building customized high-level IoT services which rely on the real time data streams from low-level physical IoT sensors.
Jin, Jiong, Keoh, Sye Loong, Ko, Hajoon
core +1 more source
X.509 certificate error testing [PDF]
X.509 Certificates are used by a wide range of technologies to verify identities, while the SSL protocol is used to provide a secure encrypted tunnel through which data can be sent over a public network.
Jimenez M., Momani E. M. H., Toma C
core +2 more sources
MixEth: Efficient, Trustless Coin Mixing Service for Ethereum [PDF]
Coin mixing is a prevalent privacy-enhancing technology for cryptocurrency users. In this paper, we present MixEth, which is a trustless coin mixing service for Turing-complete blockchains.
, , Buckland, Chris
core +1 more source
Method of Anti-Virus Protection Based on (n, t) Threshold Proxy Signature with an Arbitrator
The article suggests the method of anti-virus protection of mobile devices based on the usage of proxy digital signatures and an (n;t)-threshold proxy signature scheme with an arbitrator.
E. A. Tolyupa
doaj +1 more source
An Adaptive Photovoltaic Topology to Overcome Shading Effect in PV Systems
Shading in photovoltaic systems can cause many undesired effects. When shading occurs, the power generated from the PV system is much less than nominal power, increasing the electrical mismatching losses between PV system components.
Mohamed Amer Chaaban +2 more
doaj +1 more source
PB-PKI: A Privacy-aware Blockchain-based PKI
Conventional public-key infrastructure (PKI) designs using certificate authorities and web-of-trust are not optimal and have security flaws. The properties afforded by the Bitcoin blockchain are a natural solution to some of the problems with PKI - in particular, certificate transparency and elimination of single points-offailure.
Axon, L, Goldsmith, M
openaire +2 more sources
The Kinase Specificity of Protein Kinase Inhibitor Peptide
G-protein-coupled-receptor (GPCR) signaling is exquisitely controlled to achieve spatial and temporal specificity. The endogenous protein kinase inhibitor peptide (PKI) confines the spatial and temporal spread of the activity of protein kinase A (PKA ...
Yao Chen, Yao Chen, Bernardo L. Sabatini
doaj +1 more source
Efficient asynchronous accumulators for distributed PKI [PDF]
Cryptographic accumulators are a tool for compact set representation and secure set membership proofs. When an element is added to a set by means of an accumulator, a membership witness is generated. This witness can later be used to prove the membership
Yakoubov, Sophia
core +2 more sources

