Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 219,937,501 papers from all fields of science
Search
Sign In
Create Free Account
PKCS 11
Known as:
Cryptoki
, PKCS ♯11
, PKCS11
In cryptography, PKCS #11 is one of the Public-Key Cryptography Standards, and also refers to the programming interface to create and manipulate…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
19 relations
Application programming interface
Certificate authority
Cryptography
DigiDoc
Expand
Broader (1)
Cryptography standards
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Sampurna Suraksha: Unconditionally Secure and Authenticated One Time Pad Cryptosystem
R. Shukla
,
H. Prakash
,
R. Bhushan
,
S. Venkataraman
,
G. Varadan
International Conference on Machine Intelligence…
2013
Corpus ID: 16103710
Information security has been a growing concern over the past few years. During the last few decades, the importance of security…
Expand
2012
2012
DNA Damage and Cellular Stress Responses AktPromotesPost-IrradiationSurvival ofHumanTumorCells through Initiation , Progression , and Termination of DNA-PKcs – Dependent DNA Double-Strand Break…
M. Toulany
,
Kyung-jong Lee
,
+6 authors
H. Rodemann
2012
Corpus ID: 728409
Akt phosphorylation has previously been described to be involved in mediating DNA damage repair through the nonhomologous end…
Expand
2012
2012
Cancer Therapy : Preclinical HDAC Inhibitors Augmented Cell Migration and Metastasis through Induction of PKCs Leading to Identi fi cation of Low Toxicity Modalities for Combination Cancer Therapy
Kuen-Tyng Lin
,
Yi-Wei Wang
,
C. Chen
,
Chun-Ming Ho
,
Wen-Hui Su
,
Y. Jou
2012
Corpus ID: 36310414
Purpose: Histone deacetylase inhibitors (HDACi) are actively explored as new-generation epigenetic drugs but have low efficacy in…
Expand
2011
2011
Detection and Analysis of Cryptographic Data Inside Software
R. Zhao
,
Dawu Gu
,
Juanru Li
,
Ran Yu
Information Security Conference
2011
Corpus ID: 40665068
Cryptographic algorithms are widely used inside software for data security and integrity. The search of cryptographic data…
Expand
2010
2010
Analysis and Research on Cryptographic Security Architecture
Rong Xiao-feng
2010
Corpus ID: 63563328
The definition and functions of typical crypto security architectures are illustrated systematically.The features of typical…
Expand
2007
2007
고속 패킷 통신을 위한 패킷 암호 스킴과 Cryptoki 확장 방안
고행석
,
박상현
,
권오석
2007
Corpus ID: 195611381
비 연결형 패킷 통신망에 Block Chaining…
Expand
2001
2001
Secure Multicast Protocols for Group Communication
L. Moser
,
P. Melliar-Smith
2001
Corpus ID: 60233584
Abstract : This final report for this project focuses on: Design and implementation of the Secure Group message ordering and…
Expand
1999
1999
Composing Cryptographic Services: A Comparison of Six Cryptographic APIs
A. Braga
,
R. Dahab
,
C. M. F. Rubira
1999
Corpus ID: 9484176
In this work we use Tropyc, a pattern language for cryptographic software , to evaluate a group of six Cryptographic Application…
Expand
1998
1998
Ca 2 + modulation of cis-unsaturated fatty acid-induced mutant protein kinase C activity : indication of inhibitory Ca 2 +-binding site in protein kinase C-α
F. Eshete
,
Hyun-Ho Chung
,
L. Gannon-Murakami
,
K. Murakami
1998
Corpus ID: 46714076
The C2 domain in protein kinase C (PKC) is homologous to equivalent domains in a number of important cytoplasmic proteins. Except…
Expand
Review
1997
Review
1997
Pkcs #7: Cryptographic Message Syntax
Rsa
,
R L Rivest
,
A. Shamir
,
L. Adleman
1997
Corpus ID: 5119468
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE