نتایج جستجو برای: first certificate

تعداد نتایج: 1448969  

1999
Albert Levi M. Ufuk Çaglayan

Nested certificates are used to certify their subject certificates. In this way, the subject certificates can be verified via their nested certificates without using signature verification methods based on public key cryptosystems. Such a verification method is called as subject certificate verification. In this paper, subject certificate verification method will be introduced. It will be shown...

Journal: :Security and Communication Networks 2013
Soyoung Park Baber Aslam Damla Turgut Cliff Changchun Zou

—In this paper, we propose two certificate mechanisms for preventing the Sybil attack in a vehicular ad hoc network (VANET): the timestamp series approach and the temporary certificate approach. We focus on an early-stage VANET when the number of smart vehicles is only a small fraction of the vehicles on the road and the only infrastructure components available are the roadside units (RSUs). Un...

2006
Elvira Albert Puri Arenas Germán Puebla

ion-Carrying Code Elvira Albert, Puri Arenas, and Germán Puebla 1 Complutense University of Madrid, {elvira,puri}@sip.ucm.es 2 Technical University of Madrid, [email protected] Abstract. Abstraction-Carrying Code (ACC) has recently been proAbstraction-Carrying Code (ACC) has recently been proposed as a framework for proof-carrying code (PCC) in which the code supplier provides a program together...

2008
Frédéric Blanqui Jean-Pierre Jouannaud Pierre-Yves Strub

We investigate here a new version of the Calculus of Inductive Constructions (CIC) on which the proof assistant Coq is based: the Calculus of Congruent Inductive Constructions, which truly extends CIC by building in arbitrary first-order decision procedures: deduction is still in charge of the CIC kernel, while computation is outsourced to dedicated first-order decision procedures that can be t...

Journal: :Perform. Eval. 1999
Albert Levi M. Ufuk Çaglayan

The classical certificate systems are computationally inefficient, since they use signature operations based on public key cryptosystems. The nested certificates (A. Levi, Design and performance evaluation of the nested certification scheme and its applications in public key infrastructures, Ph.D. Thesis, Department of Computer Engineering, Boğaziçi University, Istanbul, Turkey) are proposed to...

2015
Duane Wilson Giuseppe Ateniese

PGP is built upon a Distributed Web of Trust in which a user’s trustworthiness is established by others who can vouch through a digital signature for that user’s identity. Preventing its wholesale adoption are a number of inherent weaknesses to include (but not limited to) the following: 1) Trust Relationships are built on a subjective honor system, 2) Only first degree relationships can be ful...

Journal: :College & Research Libraries News 2021

In fall 2019, the University of Wyoming (UW) Libraries launched an information and digital literacy badge certificate program in partnership with Ellbogen Center for Teaching Learning (ECTL), housed UW main branch. ECTL crafts programing provides support graduate students, staff, faculty who teach on our campus by employing instructional designers.The Information Digital Badge Certificate Progr...

2004

The certificate-based authentication is well studied in wired networks. However, adapting certificatebased authentication protocols to mobile ad hoc networks (MANETs) is a nontrivial task, mainly because, in a MANET, as opposed to conventional wired networks, there typically exists no fixed infrastructure or centralized management. For example, a conventional certificate-based authentication sy...

Journal: :مدیریت اطلاعات سلامت 0

introduction: it is necessary to have exact, complete and up-to-date information about death of people in a society. this information can be useful in planning, determining priorities, distributing facilities, allocating budgets and rendering health care services justly. in this study, the methods and rules about registration, completion, issuances and collection of death certificates in esfaha...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید