Certificates verification on the block chain

نویسندگان

چکیده

All certificates, including those for secondary school graduation, high diplomas, and college degrees, have been converted to digital form made accessible students at higher education institutions. It's essential learners keep track of their diplomas. It is a complex time-consuming process the institution or organization verify authenticate certificate's validity. This application would aid in safekeeping certificates on block chain. Digital are created by first digitising original paper certificates. The hash code value generated using chaotic technique. then added mobile used these certifications. We can make certificate verification more reliable safe implementing chains.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automated verification of termination certificates

In order to increase user confidence, many automated theorem provers provide certificates that can be independently verified. In this paper, we report on our progress in developing a standalone tool for checking the correctness of certificates for the termination of term rewrite systems, and formally proving its correctness in the proof assistant Coq. To this end, we use the extraction mechanis...

متن کامل

Distributed Certificates Chain Searching Algorithms Based on Trustworthy

To address the distributed certificates searching problem in trust management, the member set and privilege set are defined, the forward, backward and bidirectional distributed certificates searching algorithms based on the definitions are brought forward, the complexity of the algorithms and also the comparison of the algorithms and existing algorithms are analyzed, the application of the algo...

متن کامل

Verification of classical certificates via nested certificates and nested certificate paths

Nested certificates are used to certify their subject certificates. In this way, the subject certificates can be verified via their nested certificates without using signature verification methods based on public key cryptosystems. Such a verification method is called as subject certificate verification. In this paper, subject certificate verification method will be introduced. It will be shown...

متن کامل

Wban Client Verification Using Remote Anonymous Authentication Schemes without Certificates

In this paper, communication between Client and Application provider should be authentic; so two protocols are used for authentication which is trivial and coherent performed through Network manager (NM). The authentication success between WBAN client and Application provider (AP) is used to activate users of WBAN in distant to access services such as healthcare, medical applications, military ...

متن کامل

Safety Verification of Hybrid Systems Using Barrier Certificates

This paper presents a novel methodology for safety verification of hybrid systems. For proving that all trajectories of a hybrid system do not enter an unsafe region, the proposed method uses a function of state termed a barrier certificate. The zero level set of a barrier certificate separates the unsafe region from all possible trajectories starting from a given set of initial conditions, hen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Health Sciences (IJHS)

سال: 2022

ISSN: ['2550-6978', '2550-696X']

DOI: https://doi.org/10.53730/ijhs.v6ns8.9809