Spelling suggestions: "subject:"publickey infrastructure"" "subject:"publickeys infrastructure""
1 |
A smart card based authentication system for peer and group modelChan, Tak-fai, Dan., 陳德辉. January 2008 (has links)
published_or_final_version / Computer Science / Master / Master of Philosophy
|
2 |
A smart card based authentication system for peer and group modelChan, Tak-fai, Dan. January 2008 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2009. / Includes bibliographical references (p. 63-70) Also available in print.
|
3 |
The Impact of the Common Data Security Architecture (CDSA) on Telemetry Post Processing ArchitecturesKalibjian, Jeffrey R. 10 1900 (has links)
International Telemetering Conference Proceedings / October 25-28, 1999 / Riviera Hotel and Convention Center, Las Vegas, Nevada / It is an increasing requirement that commercial satellite telemetry data product be protected from unauthorized access during transmission to ground stations. While the technology (cryptography) to secure telemetry data product is well known, the software infrastructure to support such security is costly, and very customized. Further, many software packages have difficulty interoperating. The Common Data Security Architecture [1] [2] [3] (originally proposed by the Intel Corporation, and now adopted by the Open Group), is a set of common cryptographic [4] and public key infrastructure (PKI) application programming interfaces (APIs) which will facilitate better cryptographic interoperability as well as making cryptographic resources more readily available in telemetry post processing environments.
|
4 |
RESEARCH OF SECURITY HARDWARE IN PKI SYSTEMWenhua, Qi, Qishan, Zhang, Hailong, Liu 10 1900 (has links)
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada / Security hardware based on asymmetric algorithm is the key component of Public Key Infrastructure (PKI), which decides the safety and performance of system. Security device in server or client have some common functions. We designed the client token and cryptographic server to improve the performance of PKI, and got obvious effect.
|
5 |
建立一個以服務多代理者系統為主的公鑰匙架構 / Building a Public Key Infrastructure for Multi-Agent Systems唐朝緯, Chao-Wei Tang Unknown Date (has links)
代理者(Agent)是一個自主性的軟體程式,可以幫助代表人類在網際網路上從事各種的電子化服務(E-Service)。由於目前多代理者系統缺少了安全管理的機制,以致於目前為止代理者代表人類在網上從事活動的行為還不被大家接受。因此,我們提出了一套以代理者為導向的公鑰匙架構(Agent-Oriented Public Key Infrastructure, APKI),各式各樣的數位憑證被產生、儲存、註銷及驗證,以滿足不同存取控制的需求。例如,代理者的認證是以代理者身份憑證為基礎,而授權的部分則以授權憑證或屬性憑證來做驗證。透過這些數位憑證,我們可以在虛擬網路上的代理者之間建立一條信任路徑,一個安全的電子化服務的實際應用範例將會以此架構實作及呈現出來,以驗證我們所提架構的可行性。 / Agent is autonomous software that mediates e-service for human on the Internet. The acceptance of agent-mediated e-service (AMES) is very slow for the lacking of security management infrastructure for multi-agent system. Therefore we proposed an agent-oriented public key infrastructure (APKI) for multi-agent e-service. In this APKI, a taxonomy of digital certificates are generated, stored, verified, and revoked to satisfy different access and delegation control purposes. Agent identity certificate was designed for agent’s authentication whereas attributed and agent authorization certificates were proposed for agent’s authorization and delegation. Using these digital certificates, we establish agent trust relationships on the cyberspace. A trusted agent-mediated e-service scenario will be shown to demonstrate the feasibility of our APKI.
|
6 |
Installation, configuration and operational testing of a PKI certificate server and its supporting services /Ambers, Vanessa P. Kelly, Amanda M. January 2004 (has links) (PDF)
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, June 2004. / Thesis advisor(s): J.D. Fulp, Dan C. Boger. Includes bibliographical references (p. 159-160). Also available online.
|
7 |
Long term preservation of electronic documentsYu, Kin-ying., 余見英. January 2004 (has links)
published_or_final_version / abstract / toc / Computer Science and Information Systems / Master / Master of Philosophy
|
8 |
Forward security from bilinear pairings: signcryption and threshold signatureChow, Sze-ming, Sherman., 周斯明. January 2004 (has links)
published_or_final_version / abstract / toc / Computer Science and Information Systems / Master / Master of Philosophy
|
9 |
Forward security from bilinear pairings signcryption and threshold signature /Chow, Sze-ming, Sherman. January 2004 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2005. / Title proper from title frame. Also available in printed format.
|
10 |
Public key infrastructure utilization to provide an added level of authenticity to transmitted dataBlackmon, Jason B. January 2010 (has links) (PDF)
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, March 2010. / Thesis Advisor(s): Buddenberg, Rex. Second Reader: Housel, Thomas. "March 2010." Description based on title screen as viewed on April 27, 2010. Author(s) subject terms: Public key infrastructure, user agent, authenticity, confidentiality, integrity. Includes bibliographical references (p. 47-48). Also available in print.
|
Page generated in 0.0713 seconds