نتایج جستجو برای: first certificate

تعداد نتایج: 1448969  

Journal: :Security and Communication Networks 2014
Ali Mahmoodi Javad Mohajeri Mahmoud Salmasizadeh

In this paper, we propose the first provable secure certificate-based proxy signature with message recovery without bilinear pairing. The notion of certificate-based cryptography was initially introduced by Gentry in 2003, in order to simplify certificate management in traditional public key cryptography (PKC) and to solve the key escrow problem in identity-based cryptosystems. To date, a numbe...

Journal: :RFC 2012
Geoff Huston Robert Loomans Byron Ellacott Rob Austein

This document defines a framework for certificate management interactions between an Internet Number Resource issuer ("issuer") and an Internet Number Resource recipient ("subject") through the specification of a protocol for interaction between the two parties. The protocol supports the transmission of requests from the subject, and corresponding responses from the issuer encompassing the acti...

Journal: :IEICE Transactions on Information and Systems 2023

This paper first takes IoT as an example to provide the motivation for eliminating single point of trust (SPOT) in a CA-based private PKI. It then describes distributed public key certificate-issuing infrastructure that eliminates SPOT and its limitation derived from generating signing keys. Finally, it proposes method address by all certificate issuers.

Journal: :Medical History 1991
H D Isaacs

Among the Geniza writings preserved in Cambridge University Library's TaylorSchechter Collection is a medieval Arabic medical certificate which has not hitherto been published or studied. Class-marked as T-S NS 327.51, this document is the earliest medical certificate known to me and is of sufficient interest to merit publication. Since the condition to which the certificate relates is leprosy,...

Journal: :IJSN 2006
Eunjin Jung Mohamed G. Gouda

A certificate system can be represented by a directed graph, called a certificate graph, where each node represents a user that has a public key and a private key and each edge (u, v) represents a certificate that is signed by the private key of u and contains the public key of v. Two types of damage can be done in a certificate graph when the private key of a node u in the graph is revealed to...

Journal: :فصلنامه شخصیت و تفاوت های فردی 0

0

Journal: :Proceedings of the Institution of Automobile Engineers 1916

2003
Robert L. Constable Stuart Allen Mark Bickford James Caldwell Jason Hickey Christoph Kreitz

ness: This means abstractness with respect to object identifiers (see Abstract Ids & Closed Maps (section 4.4.1) and Abstract Identifiers (how) (section 4.4.4)). When a closed map is uniformly renamed or is retrieved from the FDL, which is only guaranteed modulo renaming, there is no rechecking of certificates; they are treated like any other objects. Suppose, for example, that during a session...

Journal: :CoRR 2017
Sankalp Bagaria R. Balaji B. S. Bindhumadhava

TLS uses X.509 certificates for server authentication. A X.509 certificate is a complex document and various innocent errors may occur while creating/ using it. Also, many certificates belong to malicious websites and should be rejected by the client and those web servers should not be visited. Usually, when a client finds a certificate that is doubtful using the traditional tests, it asks for ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید