Sciweavers

86 search results - page 13 / 18
» Planning for Directory Services in Public Key Infrastructure...
Sort
View
APNOMS
2009
Springer
14 years 1 months ago
A PKI Based Mesh Router Authentication Scheme to Protect from Malicious Node in Wireless Mesh Network
Wireless mesh network can increase service coverage by low-cost multiple-paths between a source and a destination. But because of the wireless nature, wireless mesh network is vuln...
Kwang Hyun Lee, Choong Seon Hong
CCGRID
2004
IEEE
13 years 11 months ago
A hardware-secured credential repository for Grid PKIs
Public Key Infrastructures suffer from usability and security problems associated with the request for and secure management of end user credentials. Online credential repositorie...
Markus Lorch, Jim Basney, Dennis G. Kafura
CSI
2007
91views more  CSI 2007»
13 years 7 months ago
Implementing regular cash with blind fixed-value electronic coins
We propose a generic framework for the development of an off-line peer-to-peer electronic payment system with fixed-value electronic coins. The proposed scheme simulates the issua...
Dimitrios Lekkas, Diomidis Spinellis
JDCTA
2008
160views more  JDCTA 2008»
13 years 7 months ago
Classification of IT Governance Tools for Selecting the Suitable One in an Enterprise
The Information Technology (IT) governance arrangements refer to the patterns of authority for key IT activities in organizations, including IT infrastructure, IT use, and project...
Fatemeh NasserEslami, Mehdi Fasanghari, H. R. Khod...
CPHYSICS
2007
87views more  CPHYSICS 2007»
13 years 7 months ago
HEP computing in Korea
The current status of High Energy Physics (HEP) computing system and plan of HEP data grid in Korea are reported. The main infrastructure is located at the Center for High Energy ...
Dongchul Son, Jun-Suhk Suh