Results 21 to 30 of about 1,300,731 (292)

The case of public transport infrastructure in Malta, and its impact on the elderly [PDF]

open access: yes, 2016
The concept of equity is essential in transport because inequities lead to the formation of transport-disadvantaged groups, such as the elderly, disabled and low-income people. This paper focuses on the elderly.
Bajada, Therese   +2 more
core   +1 more source

Trust Model for the Russian Federation Digital Economy

open access: yesБезопасность информационных технологий, 2020
The paper presents a study of modern trust models based on the Public Key Infrastructure (PKI) infrastructure, the purpose of which is to develop a Russian national trust model.
Dmitry A. Melnikov   +2 more
doaj   +1 more source

Cross-Certification Towards Distributed Authentication Infrastructure: A Case of Hyperledger Fabric

open access: yesIEEE Access, 2020
In Internet of Things ecosystems, where various entities trade data and data analysis results, public key infrastructure plays an important role in establishing trust relationships between these entities to specify who trusts whose private keys.
Shohei Kakei   +5 more
doaj   +1 more source

Transitioning to a Hyperledger Fabric Quantum-Resistant Classical Hybrid Public Key Infrastructure

open access: yesThe Journal of The British Blockchain Association, 2019
This research has two parts; the first is to identify enterprise Hyperledger Fabric (HLF) blockchain cybersecurity vulnerabilities, threats, and legal obligations in a Post-Quantum Cryptography (PQC) world.
Robert Campbell
doaj   +1 more source

INTEGRITY MONITORING IMPLEMENTATION FOR THE OPERATING SYSTEM IMAGE LOADED THROUGH A NETWORK TO THE THIN CLIENT [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2015
The paper deals with the problem of protection for the process of operating system loading from the server to the diskless workstation through a network and the analysis of the existing ways of integrity monitoring for information transferred under ...
Y. A. Gatchin, O. A. Teploukhova
doaj   +1 more source

Attribute-Based Encryption in Securing Big Data from Post-Quantum Perspective: A Survey

open access: yesCryptography, 2022
Attribute-based encryption (ABE) cryptography is widely known for its potential to solve the scalability issue of recent public key infrastructure (PKI).
Zulianie Binti Jemihin   +2 more
doaj   +1 more source

BlockPKI: An Automated, Resilient, and Transparent Public-Key Infrastructure

open access: yes, 2018
This paper describes BlockPKI, a blockchain-based public-key infrastructure that enables an automated, resilient, and transparent issuance of digital certificates.
Chuat, Laurent   +3 more
core   +1 more source

A robust self-organized public key management for mobile ad hoc networks [PDF]

open access: yes, 2010
A mobile ad hoc network (MANET) is a self-organized wireless network where mobile nodes can communicate with each other without the use of any existing network infrastructure or centralized administration. Trust establishment and management are essential
Capkun   +14 more
core   +1 more source

CTB-PKI: Clustering and Trust Enabled Blockchain Based PKI System for Efficient Communication in P2P Network

open access: yesIEEE Access, 2022
The decentralization feature of public and private blockchain-based applications is achieved by selecting different nodes as validators or Certificate Authority ( $CA$ ) for each transaction.
Amrutanshu Panigrahi   +4 more
doaj   +1 more source

Internet X.509 Public Key Infrastructure Operational Protocols -- LDAPv3 [PDF]

open access: yes, 2002
This document describes the features of the Lightweight Directory Access Protocol v3 that are needed in order to support a public key infrastructure based on X.509 certificates and ...
Chadwick, David W.
core  

Home - About - Disclaimer - Privacy