نتایج جستجو برای: first certificate
تعداد نتایج: 1448969 فیلتر نتایج به سال:
In this paper, we first propose the definition and security model of certificate-based proxy signature (CBPS). We then show that the certificate-based proxy signature scheme presented by Kang, Park and Hahn in CT-RSA 2004 are insecure against key replacement attacks. We further propose two certificate-based proxy signature schemes, which are shown to be existentially unforgeable against adaptiv...
In Mobile Ad hoc Networks (MANETs), certification systems play an important role to achieve network security. Handling the issue of certificate revocation in wired network is somewhat easy compared to the MANETs. In wired network when the certificate of a malicious node get revoked then the certificate authorities add the information about the revoked node in to certificate revocation lists (CR...
Certificate transparency (CT) is an elegant mechanism designed to detect when a certificate authority (CA) has issued a certificate incorrectly. Many CAs now support CT and it is being actively deployed in browsers. However, a number of privacy-related challenges remain. In this paper we propose practical solutions to two issues. First, we develop a mechanism that enables web browsers to audit ...
An experiment was conducted to determine the effectiveness of three invitation and incentive combinations in a web-based survey. A stratified convenience sample of 434 researchers who were target users of a collaboratory for earthquake engineering was randomly divided into three experimental conditions: (a) a $5 bill sent with the survey instructions via first class mail, (b) a $5 gift certific...
Signcryption is an important cryptographic primitive that simultaneously achieves confidentiality and authentication in an efficient manner. In 2008, Luo et al. introduced the notion of certificate-based signcryption and proposed the first construction of certificate-based signcryption. However, their scheme is insecure under the key replacement attack and also does not provide insider security...
Introduction: Death information plays a critical role in the adjustment of health plans, and the cause of death coding leads to organizing this information .The Purpose of this study was to review the impact of errors in the completion of death certificate on underlying the cause of death coding in Shahid Mohammadi hospital in Bandarabbas. Methods : This descriptive-cross sectional study...
1. INTRODUCTION The manner in which students are admitted for third level education and in particular the points system have become matters of increasing public controversy in recent years. While the subject is understandably emotive, a sad feature of many of the arguments presented to date has been the very limited factual support. Our purpose in this paper is threefold: firstly to introduce s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید