Searched for: "public key infrastructure analysis"
- Security (31)
- Cxo (18)
- Networking (7)
- Developer (6)
- Banking (4)
- Cloud (4)
- Data Centers (4)
- Collaboration (3)
- Enterprise Software (3)
- Project Management (3)
- Software (3)
- After Hours (2)
- Big Data (2)
- Mobility (2)
- Social Enterprise (2)
- Eu (1)
- Hardware (1)
- Microsoft (1)
- Smbs (1)
- Start-Ups (1)
About 99 results for "public key infrastructure analysis"
Brett Goldstein, the former chief data officer of the City of Chicago, reflects on how the CDO role is evolving, and where it needs to go.
Learn how the battle over privacy technologies could define the future of the web. This TechRepublic cover story explains the strange history and the serious consequences of the fi...
Alex Howard thinks 2015 will be a big year for digital government services and identity in the US. He also profiles the startup ID.me, which will provide identity software for Conn...
A landmark Supreme Court ruling on the digital domain, the impact of opening data, the 'right to record,' and data transparency were key topics in 2014 related to how tech drives s...
Standardization Requirements Analysis on Big Data in Public Sector Based on Potential Business Models
In recent years, according to the exponential growth of data, Big data is the key issue for data application. Many companies and government agencies are trying to adopt Big data te...
Central to the secure operation of a Public Key Infrastructure (PKI) is the ability to revoke certificates. While much of users' security rests on this process taking place quickly...
The surveillance analysis in Mobile Ad hoc NETworks (MANETs) is nearly associated to cryptography. There are voluminous security routing protocols and key management layouts that h...
A new proposal from the FCC would allocate billions of E-Rate dollars to install Wi-Fi networks in every school and library in the US.
Embedded systems are an integral part of almost every electronic product today. From consumer electronics to industrial components in SCADA systems, their possible fields of applic...
In this paper, the authors provide analysis of thirteen information security. Technology topics, arranged in ten groups that are either commonly found or emerging within the inform...