نتایج جستجو برای: first certificate

تعداد نتایج: 1448969  

Journal: :JCP 2009
Jiguo Li Lizhong Xu Yichen Zhang

In this paper, we first propose the definition and security model of certificate-based proxy signature (CBPS). We then show that the certificate-based proxy signature scheme presented by Kang, Park and Hahn in CT-RSA 2004 are insecure against key replacement attacks. We further propose two certificate-based proxy signature schemes, which are shown to be existentially unforgeable against adaptiv...

Journal: :فصلنامه شخصیت و تفاوت های فردی 0

0

Journal: :فصلنامه تخصصی علوم سیاسی 0

0

2013
Naresh Kumar

In Mobile Ad hoc Networks (MANETs), certification systems play an important role to achieve network security. Handling the issue of certificate revocation in wired network is somewhat easy compared to the MANETs. In wired network when the certificate of a malicious node get revoked then the certificate authorities add the information about the revoked node in to certificate revocation lists (CR...

Journal: :PoPETs 2017
Saba Eskandarian Eran Messeri Joseph Bonneau Dan Boneh

Certificate transparency (CT) is an elegant mechanism designed to detect when a certificate authority (CA) has issued a certificate incorrectly. Many CAs now support CT and it is being actively deployed in browsers. However, a number of privacy-related challenges remain. In this paper we propose practical solutions to two issues. First, we develop a mechanism that enables web browsers to audit ...

Journal: :The Lancet 1829

2004
Jeremy P. Birnholtz Daniel B. Horn Thomas A. Finholt Sung Joo Bae JEREMY P. BIRNHOLTZ DANIEL B. HORN THOMAS A. FINHOLT SUNG JOO BAE

An experiment was conducted to determine the effectiveness of three invitation and incentive combinations in a web-based survey. A stratified convenience sample of 434 researchers who were target users of a collaboratory for earthquake engineering was randomly divided into three experimental conditions: (a) a $5 bill sent with the survey instructions via first class mail, (b) a $5 gift certific...

Journal: :IACR Cryptology ePrint Archive 2011
Yang Lu Jiguo Li

Signcryption is an important cryptographic primitive that simultaneously achieves confidentiality and authentication in an efficient manner. In 2008, Luo et al. introduced the notion of certificate-based signcryption and proposed the first construction of certificate-based signcryption. However, their scheme is insecure under the key replacement attack and also does not provide insider security...

ژورنال: مدیریت سلامت 2013
حیوی حقیقی, محمد حسین, خرمی, فربد, دهقانی, محمد, علی پور, جهانپور ,

     Introduction: Death information plays a critical role in the adjustment of health plans, and the cause of death coding leads to organizing this information .The Purpose of this study was to review the impact of errors in the completion of death certificate on underlying the cause of death coding in Shahid Mohammadi hospital in Bandarabbas.   Methods : This descriptive-cross sectional study...

1979
M. A. Moran M. J. Crowley

1. INTRODUCTION The manner in which students are admitted for third level education and in particular the points system have become matters of increasing public controversy in recent years. While the subject is understandably emotive, a sad feature of many of the arguments presented to date has been the very limited factual support. Our purpose in this paper is threefold: firstly to introduce s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید