نتایج جستجو برای: first certificate
تعداد نتایج: 1448969 فیلتر نتایج به سال:
Similar to certificateless cryptography, certificate-based cryptography is another novel public key setting which combines the merits of traditional public key cryptography (PKC) and identity-based cryptography (IBC). Both certificateless cryptography and certificate based cryptography do not have the key escrow problem in identity-based cryptography, and greatly reduce the overhead of certific...
INTRODUCTION Entry into university education in Ireland, including dental school, is based solely on academic performance in the Leaving Certificate Examination, held at the end of formal school education. The aim of this investigation was to examine the suitability of this process for the selection of dental students in Ireland. MATERIALS AND METHODS Information for all dental students who e...
OBJECTIVE To estimate the effect of certificate-of-need legislation on hospital bed supply and healthcare expenditures. STUDY DESIGN This study uses state data on several variables, including healthcare expenditures, hospital bed supply, and the existence of a certificate-of-need program, from 4 periods (1985, 1990, 1995, and 2000). METHODS We estimate 2 multivariate regression equations. I...
The roadside unit (RSU) plays an important role in VANET environments for privacy preservation. In order to conserve the privacy of a vehicle, the issued certificate must be updated frequently via RSUs. If a certificate expires without being updated, the services for the vehicle will be terminated. Therefore, deploying as more as possible RSUs ensures that the certificate can be updated before ...
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption. The merit of certificatebased encryption lies in implicit certificate and no private key escrow. This feature is desirable especially for the efficiency and the real spontaneity of ring signature, which involve a large number of public keys in each execution. In this paper, we propose an efficient certificatebased ...
In Vehicular ad hoc network (VANET) vehicles communicates through wireless channels, so there will be variety of attacks. To secure vehicular ad hoc network, deployed Public Key Infrastructure (PKI), and to use Certificate Revocation List (CRL) for managing the revoked certificates. The authentication of received message can be performed by first check if the sender’s certificate is in current ...
The certificateless-based signature system allows people to verify the signature without the certificate. For this reason, we do not need the certificate authority (CA) to store and manage users’ certificates and public keys. Certificateless-based signature can also overcome the certificate management problem and the key escrow problem of the traditional signature system. In 2012, Zhang and Mao...
Proof Since PATH is co-NL-complete, it suffices to prove that PATH ∈ NL. We’ll use the the read-once certificate definition of NSPACE(·). Let Ci def = {vertices reachable from s with ≤ i steps}. Clearly, C0 = {s}. To prove “vertex x ∈ V can be reached in at most i steps starting from s” (x ∈ Ci), it’s easy by providing the path as a certificate: s, v1, · · · , v`, x where ` < i. The verifier si...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید