Suchergebnisse - "PUBLIC key infrastructure (Computer security)"
-
1
Alternate Title: THE ESSENCE OF UKRAINE'S CYBER DEFENSE: DEFINITION AND CONTRADICTIONS OF LEGAL AND THEORETICAL PRINCIPLES. (English)
Autoren: et al.
Quelle: Cybersecurity: Education, Science, Technique / Kiberbezpeka: Osvita, Nauka, Tekhnika; 2025, Vol. 2 Issue 30, p401-412, 12p
-
2
Autoren: et al.
Quelle: Computer Communications. Apr2024, Vol. 220, p149-159. 11p.
Schlagwörter: *PUBLIC key cryptography, *BLOCKCHAINS, *ALGORITHMS, PUBLIC key infrastructure (Computer security), HOMOGENEITY
-
3
Autoren: et al.
Quelle: High-speed Railway; Sep2025, Vol. 3 Issue 3, p229-237, 9p
-
4
Alternate Title: THE ESSENCE OF UKRAINE'S CYBER DEFENSE: DEFINITION AND CONTRADICTIONS OF LEGAL AND THEORETICAL PRINCIPLES. (English)
Autoren: et al.
Quelle: Cybersecurity: Education, Science, Technique / Kiberbezpeka: Osvita, Nauka, Tekhnika; 2025, Vol. 1 Issue 29, p401-412, 12p
-
5
Autoren: O'NEILL, ERIC
Quelle: Modern Casting. Dec2025, Vol. 115 Issue 12, p32-34. 3p.
-
6
Autoren: et al.
Quelle: Communications of the ACM. Mar2018, Vol. 61 Issue 3, p109-116. 8p. 1 Diagram, 7 Graphs.
Schlagwörter: *DIGITAL certificates, *INTERNET servers, *SECURITY systems, PUBLIC key infrastructure (Computer security), SOFTWARE upgrades
Reviews & Products: OPENSSL (Computer software)
-
7
Autoren: et al.
Quelle: Entropy. Aug2023, Vol. 25 Issue 8, p1157. 15p.
-
8
Autoren: Drab-Kurowska, Anna
Quelle: EUROPEAN RESEARCH STUDIES JOURNAL. :325-332
Schlagwörter: Postal service, Public key infrastructure (Computer security), 9. Industry and infrastructure, 13. Climate action, 4. Education, Infrastructure (Economics), 8. Economic growth, 11. Sustainability, Information resources management, 1. No poverty, 16. Peace & justice, 7. Clean energy, 12. Responsible consumption
-
9
Autoren: et al.
Quelle: Sensors (14248220); Oct2024, Vol. 24 Issue 19, p6217, 28p
-
10
Autoren: et al.
Quelle: PLoS ONE. 9/29/2022, Vol. 17 Issue 9, p1-19. 19p.
-
11
Autoren:
Quelle: Journal of the ACM. Nov2009, Vol. 57 Issue 1, p3-3:39. 39p. 6 Charts.
-
12
Autoren:
Quelle: Communications of the ACM. Jan2012, Vol. 55 Issue 1, p91-95. 5p.
-
13
Autoren:
Quelle: Journal of Cybersecurity & Privacy; Jun2024, Vol. 4 Issue 2, p196-222, 27p
-
14
Autoren:
Quelle: Cluster Computing; Jun2024, Vol. 27 Issue 3, p2947-2958, 12p
-
15
Autoren: Trzupek, Brian1 (AUTHOR)
Quelle: Network Security. Nov2020, Vol. 2020 Issue 11, p14-17. 4p.
-
16
Autoren: Monroe, Don
Quelle: Communications of the ACM; Feb2023, Vol. 66 Issue 2, p15-17, 3p, 1 Color Photograph
Schlagwörter: QUANTUM computing, PUBLIC key cryptography, PUBLIC key infrastructure (Computer security), DIGITAL signatures, ALGORITHMS
Firma/Körperschaft: NATIONAL Institute of Standards & Technology (U.S.)
-
17
Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems.
Autoren: et al.
Quelle: ACM Transactions on Privacy & Security; Feb2024, Vol. 27 Issue 1, p1-25, 25p
Schlagwörter: CALLER ID spoofing, TELEPHONE crimes, PUBLIC key infrastructure (Computer security), SESSION Initiation Protocol (Computer network protocol)
Firma/Körperschaft: UNITED States. Federal Communications Commission
-
18
Autoren: et al.
Quelle: IEEE Transactions on Vehicular Technology. May2019, Vol. 68 Issue 5, p4602-4614. 13p.
-
19
Autoren:
Quelle: Information & Software Technology. Apr2019, Vol. 108, p65-77. 13p.
-
20
Autoren: et al.
Quelle: Computer Systems Science & Engineering. 2023, Vol. 47 Issue 2, p2061-2078. 18p.
Nájsť tento článok vo Web of Science
Full Text Finder