نتایج جستجو برای: pki
تعداد نتایج: 1556 فیلتر نتایج به سال:
Pada masa revolusi Kemerdekaan Indonesia menghadapi beberapa tantangan. Moumen Kresek di Madiun menjadi daerah saksi kekejaman PKI pada tahun 1948. Penelitian ini bertujuan untuk (1) Mengetahui latar belakang pendirian Monumen Desa Kresek, Kecamatan wungu, Kabupaten Madiun, Provinsi Jawa Timur; (2) Fungsi serta nilai-nilai sejarah yang terdapat Kresek; (3) Hubungan dengan peristiwa G-30S-PKI Ma...
Purpose: The aim of this study was to show preclinical efficacy and clinical development potential of PKI-587, a dual phosphoinositide 3-kinase (PI3K)/mTOR inhibitor. Experimental Design: In vitro class 1 PI3K enzyme and human tumor cell growth inhibition assays and in vivo five tumor xenograft models were used to show efficacy. Results: In vitro, PKI-587 potently inhibited class I PI3Ks (IC50 ...
This document describes the Internet X.509 Public Key Infrastructure (PKI) Certificate Management Protocols. Protocol messages are defined for all relevant aspects of certificate creation and management. Note that "certificate" in this document refers to an X.509v3 Certificate as defined in [COR95, X509-AM]. The key words "MUST", "MUST NOT", "REQUIRED", "SHOULD", "SHOULD NOT", "RECOMMENDED", "M...
PURPOSE The aim of this study was to show preclinical efficacy and clinical development potential of PKI-587, a dual phosphoinositide 3-kinase (PI3K)/mTOR inhibitor. EXPERIMENTAL DESIGN In vitro class 1 PI3K enzyme and human tumor cell growth inhibition assays and in vivo five tumor xenograft models were used to show efficacy. RESULTS In vitro, PKI-587 potently inhibited class I PI3Ks (IC(5...
With the advent of wireless communication and internet protocol, many technologies have been developed to provide mobile phone user with the wireless internet service. Security supporting wireless internet must be guaranteed at same level as the wired security. But PKI (Public Key Infrastructure) which is used for the security of e-commerce in wired internet is not suitable for the mobile phone...
Password-enabled PKI facilitates the private key management by integrating easy-to-use passwords into PKI. In the first PKI research workshop, Sandhu et al. categorized password-enabled PKI schemes as virtual soft tokens and virtual smartcards [26]. Compared to the conventional PKI, password-enabled PKI introduces a security-critical server where large number of password-related credentials are...
Message authentication and key exchange are two of the most basic tasks of cryptography. Solutions based on public-key infrastructure (PKI) are prevalent. Still, the state of the art in composable security analysis of PKI-based authentication and key exchange is somewhat unsatisfactory. Specifically, existing treatments either (a) make the unrealistic assumption that the PKI is accessible only ...
Device authentication can reinforce the security of the home network services by ensuring that only specific authorized devices by specific authorized users can access the services. And it is also a mandatory technology for context-aware services in which users are not participant in the service flow. In this paper, we propose a device authentication and access control scheme based on two-layer...
This article provides a contribution to innovation research in the field of electronic signatures, particularly to the future development of the aspects of diffusion throughout the IT-technology of the "Public Key Infrastructure" (PKI). In the modern Internet economy, PKI-technology is generally seen as the basis for obligatory authentication and safe communication. Nowadays, large scale enterp...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید