Sciweavers

86 search results - page 2 / 18
» Planning for Directory Services in Public Key Infrastructure...
Sort
View
ACSAC
2000
IEEE
13 years 10 months ago
A Novel Approach to On-Line Status Authentication of Public-Key Certificates
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
Eugenio Faldella, Marco Prandini
HICSS
2007
IEEE
99views Biometrics» more  HICSS 2007»
13 years 12 months ago
Examining the Impacts of Institutional Framework on E-Government Infrastructures: A Study of Hong Kong Experiences
Since the Hong Kong SAR Government promulgated the first Digital 21 IT Strategy in November 1998, multiple major initiatives had been launched to establish the underlying infrastr...
Chun Yu, Paul Jen-Hwa Hu
ICCS
2004
Springer
13 years 11 months ago
Trusted Group Membership Service for JXTA
This paper presents Group Membership Service for JXTA extended with single or bi-directional authentication. The proposed solution exploits certificates and PKI (Public Key Infrast...
Lukasz Kawulok, Krzysztof Zielinski, Michal Jaesch...
AGENTS
1998
Springer
13 years 9 months ago
Personal Security Agent: KQML-Based PKI
Certificate management infrastructure, a.k.a. PKI (Public Key Infrastructure), which issues and provides access to public key certificates to preserve the integrity of a public ke...
Qi He, Katia P. Sycara, Timothy W. Finin
BCI
2009
IEEE
13 years 10 months ago
Assessing e-Readiness in SEE Countries: Perceptions towards e-Government Public Services
e-Government services are emerging rapidly in the developing world. Many countries use e-Government as an enabling tool to increase efficiency, enhance transparency, collect more ...
Vasileios Zarimpas, Maria Grouztidou, Despina Anas...