A Blockchain-Based Decentralized Public Key Infrastructure for Information-Centric Networks [PDF]
How to achieve secure content distribution and accountability in information-centric networking (ICN) is a crucial problem. Subscribers need to verify whether the data came from a reliable source, rather than from a spoofing adversary.
Jia Shi, Xuewen Zeng, Rui Han
doaj +2 more sources
Zaštićena komunikacija putem infrastrukture sa javnim ključevima / Secure communication via public key infrastructure [PDF]
Jedan tok informacija u okviru računarskih sistema ostvaruje se slanjem elektronske pošte. Međutim, da bi se ispunili zahtevi za kvalitativnost informacije koju ta pošta prenosi, neophodno je da računarska mreža ispunjava osnovna četiri bezbednosna ...
Đuro Alfirević
doaj +2 more sources
LPKI - A lightweight public key Infrastructure for the mobile environments [PDF]
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Mohsen Toorani +3 more
openalex +5 more sources
An End-To-End Secure Mobile Payment System Using Public Key Infrastructure System [PDF]
The exponential growth of wireless technologies and mobile devices, the mobile commerce becomes a significant for every one's life. Its popularity introduces a new channel for the research that is, M-Payment or Mobile Payment in terms of identifying new ...
S. Britto, R. Kumar, S. Albert Rabara
doaj +2 more sources
Risk Management in Public Key Infrastructure [PDF]
Nowadays, it is almost impossible not to hear or read about the risks of using computer systems. Top management is becoming more interested in risk management process and their analysis regarding the use of information technologies within their ...
Nicușor VATRĂ +1 more
doaj +3 more sources
Implementasi BGP dan Resource Public Key Infrastructure menggunakan BIRD untuk Keamanan Routing
The validity of the routing advertisements sent by one router to another is essential for Internet connectivity. To perform routing exchanges between Autonomous Systems (AS) on the Internet, a protocol known as the Border Gateway Protocol (BGP) is used ...
Valen Brata Pranaya, Theophilus Wellem
doaj +3 more sources
Architectural Building A Public Key Infrastructure Integrated Information Space
The article keeps under consideration the mattersto apply the cryptographic system having a public key to provide information security and to implya digital signature.
Vadim Ivanovich Korolev
doaj +1 more source
Research on improved scheme of resource public key infrastructure data synchronization
RPKI Relying party needs to synchronizing data from repository periodically to verify information.In general, Rsync and RRDP are the two common means to complete data synchronization, however, each of them has related problems.In order to solve these ...
Feng LENG, Qi ZHAO, Zhiwei YAN, Yu ZENG
doaj +3 more sources
Radio Frequency Public Key Generator for Digital Cryptographic Application
In Internet of Things (IoT) environments, effective public key management is crucial for managing numerous devices. RF features, primarily considered analog features within physical layer authentication by RF Fingerprinting (RFF) processes, present a ...
Jusung Kang, Young-Sik Kim, Heung-No Lee
doaj +1 more source
A Model for Integrated Tourism Infrastructure Planning in the South African Public Sector [PDF]
Tourism infrastructure is considered critical for tourism growth and destination competitiveness. Within the complex South African public sector planning system, the responsibility for infrastructure and tourism planning lies with multiple departments at
Shamilla Chettiar +2 more
doaj +1 more source

