نتایج جستجو برای: first certificate
تعداد نتایج: 1448969 فیلتر نتایج به سال:
In this paper, we propose the first provable secure certificate-based proxy signature with message recovery without bilinear pairing. The notion of certificate-based cryptography was initially introduced by Gentry in 2003, in order to simplify certificate management in traditional public key cryptography (PKC) and to solve the key escrow problem in identity-based cryptosystems. To date, a numbe...
This document defines a framework for certificate management interactions between an Internet Number Resource issuer ("issuer") and an Internet Number Resource recipient ("subject") through the specification of a protocol for interaction between the two parties. The protocol supports the transmission of requests from the subject, and corresponding responses from the issuer encompassing the acti...
This paper first takes IoT as an example to provide the motivation for eliminating single point of trust (SPOT) in a CA-based private PKI. It then describes distributed public key certificate-issuing infrastructure that eliminates SPOT and its limitation derived from generating signing keys. Finally, it proposes method address by all certificate issuers.
Among the Geniza writings preserved in Cambridge University Library's TaylorSchechter Collection is a medieval Arabic medical certificate which has not hitherto been published or studied. Class-marked as T-S NS 327.51, this document is the earliest medical certificate known to me and is of sufficient interest to merit publication. Since the condition to which the certificate relates is leprosy,...
A certificate system can be represented by a directed graph, called a certificate graph, where each node represents a user that has a public key and a private key and each edge (u, v) represents a certificate that is signed by the private key of u and contains the public key of v. Two types of damage can be done in a certificate graph when the private key of a node u in the graph is revealed to...
ness: This means abstractness with respect to object identifiers (see Abstract Ids & Closed Maps (section 4.4.1) and Abstract Identifiers (how) (section 4.4.4)). When a closed map is uniformly renamed or is retrieved from the FDL, which is only guaranteed modulo renaming, there is no rechecking of certificates; they are treated like any other objects. Suppose, for example, that during a session...
TLS uses X.509 certificates for server authentication. A X.509 certificate is a complex document and various innocent errors may occur while creating/ using it. Also, many certificates belong to malicious websites and should be rejected by the client and those web servers should not be visited. Usually, when a client finds a certificate that is doubtful using the traditional tests, it asks for ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید