Results 21 to 30 of about 23,446 (211)

Privacy‐aware PKI model with strong forward security

open access: yesInternational Journal of Intelligent Systems, 2020
With the development of network technology, privacy protection and users anonymity become a new research hotspot. The existing blockchain privacy‐aware public key infrastructure (PKI) model can ensure the privacy of users in the authentication process to
Fengyin Li   +5 more
semanticscholar   +1 more source

Ahmad Tohari’s The dancer: Revisited

open access: yesK@ta: A Biannual Publication on the Study of Language and Literature, 2017
As with many post-colonial countries, Indonesia has suffered from a long conflict between the military and civil society since its independence in 1945. This struggle is reflected in Ahmad Tohari’s novel entitled The dancer (2012), which has been largely
Dwi Setiawan
doaj   +1 more source

DINAMIKA KONFLIK ANTARA PERSATUAN GURU REPUBLIK INDONESIA DAN PARTAI KOMUNIS INDONESIA

open access: yesIstoria, 2020
ABSTRAK Persatuan Guru Republik Indonesia atau disingkat PGRI merupakan wadah organisasi yang menampung semua guru di Indonesia. PGRI memiliki peran yang sangat penting dalam pendidikan, terutama dalam perbaikan kualitas guru di Indonesia.
Angga Angga Prasetiyo
doaj   +1 more source

A blockchain-based PKI management framework

open access: yesIEEE/IFIP Network Operations and Management Symposium, 2018
Public-Key Infrastructure (PKI) is the cornerstone technology that facilitates secure information exchange over the Internet. However, PKI is exposed to risks due to potential failures of Certificate Authorities (CAs) that may be used to issue ...
Alexander Yakubov   +4 more
semanticscholar   +1 more source

A Comparison of Blockchain-based PKI Implementations

open access: yesInternational Conference on Information Systems Security and Privacy, 2020
: Blockchain technology has recently been proposed by many authors for decentralized key management in the context of Public Key Infrastructures (PKIs).
Clemens Brunner   +3 more
semanticscholar   +1 more source

Provable Security for PKI Schemes

open access: yesIACR Cryptology ePrint Archive
PKI schemes provide a critical foundation for applied cryptographic protocols. However, there are no rigorous security specifications for realistic PKI schemes, and therefore, no PKI schemes were proven secure.
Sara Wrótniak   +3 more
semanticscholar   +1 more source

USSR and revival of Indonesian Communist Party

open access: yesVestnik MGIMO-Universiteta, 2009
For more than two generations, historians have been asking themselves whether Moscow participated in the organizational and ideological revival of the Indonesian Communist Party (PKI) in 1951-53.
L. M. Efimova
doaj   +3 more sources

Hantu PKI dan Ujung Rekonsiliasi (Analisis Framing Pemberitaan PKI Era Presiden Abdurrahman Wahid dan Joko Widodo pada Majalah Tempo dan Gatra)

open access: yesJurnal Komunikasi, 2018
The issue of PKI and the efforts of reconciliation rose by mass media every year become a controversial issue. This issue increased especially in the era of President Abdurrahman Wahid (Gus Dur) and Joko Widodo.
Meigitaria Sanita, Puji Rianto
doaj   +1 more source

Protein Kinase Inhibitor Peptide as a Tool to Specifically Inhibit Protein Kinase A

open access: yesFrontiers in Physiology, 2020
The protein kinase enzyme family plays a pivotal role in almost every aspect of cellular function, including cellular metabolism, division, proliferation, transcription, movement, and survival.
Chong Liu   +4 more
doaj   +1 more source

On the Practicality of a Smart Contract PKI [PDF]

open access: yesIEEE International Conference on Decentralized Applications and Infrastructures, 2019
Public key infrastructures (PKIs) are one of the main building blocks for securing communications over the Internet. Currently, PKIs are under the control of centralized authorities, which is problematic as evidenced by numerous incidents where they have
Christos Patsonakis   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy