نتایج جستجو برای: first certificate

تعداد نتایج: 1448969  

Journal: :JCP 2012
Mengbo Hou Qiuliang Xu Fengbo Lin

Even though Public Key Infrastructure (PKI) and X.509 certificate has been a prominent security model for a variety of e-commerce applications and large scale distributed computing, it has not been sufficiently investigated in the certificate revocation and verification mechanism. In this paper, we discuss the need and importance of certificate revocation and verification, and analyze the limit...

Journal: :مجله سازمان نظام پزشکی جمهوری اسلامی ایران 0

introduction: reliable information about death causes mentioned in death certificate, is one of the basic resources for fundamental researches, epidemiological studies, public health services programming and the way of resource allocation in all countries. so, it seems, that is necessary for physicians to have enough knowledge and understandig in how to issue a death certificate. methods: this ...

Journal: :Psychiatria polska 2016
Edyta Dembińska Krzysztof Rutkowski

In our paper [1] which presented the profile of dr Ludwika Karpińska-Woyczyńska we reported 25 th August 1872 or 1875 as her date of birth and Warsaw as the city she was born in. That information was corroborated by the data collected by the University of Zurich [2] and Karpińska's curriculum vitae which she wrote herself and included as part of her doctoral thesis [3]. We deemed the sources th...

2002
Carl Ellison

This paper contrasts the use of an ID PKI (Public Key Infrastructure) with the use of delegatable, direct authorization. It first addresses some commonly held beliefs about an ID PKI – that you need a good ID certificate to use digital signatures, that the ID certificate should come from a CA that has especially good private key security, that use of the ID certificate allows you to know with w...

2000
Wenbo Mao

We present a method for blind certifying end-users' public keys and its application in offline electronic cash. A blind certificate of a public key is similar to an ordinary public-key certificate, however the identity of the certificate holder is concealed under the key certified. A digital signature supported by a blind certificate can be verified without identifying the signer. The technique...

2000
Joon S. Park Ravi S. Sandhu

A certificate is digitally signed by a certificate authority (CA) to confirm that the information in the certificate is valid and belongs to the subject. Certificate users can verify the integrity and validity of a certificate by checking the issuing CA’s digital signature in the certificate and, if necessary, chasing certificate chain and revocation lists. Usually, we use certificates to provi...

2005
Markus Jakobsson Ari Juels Phong Q. Nguyen

Certificates play an essential role in public-key cryptography, and are likely to become a cornerstone of commerce-related applications. Traditional certificates, however, are not secure against certificate lending, i.e., a situation in which a certificate holder voluntarily shares with others the rights bestowed upon him through a certificate. This type of abuse is a concern in several types o...

Journal: :Journal of Sensor and Actuator Networks 2022

Vehicle to everything (V2X) technology allows the broader development of driving safety, efficiency, and comfort. Because vehicles can quickly send receive frequent messages from other nearby devices, e.g., cooperative awareness message applications on intelligent transport system (ITS), V2X requires a good security privacy protection make reliable for ITS requirements. The existing standards d...

Journal: :Nord. J. Comput. 2007
Pinar Heggernes Dieter Kratsch

We give the first linear-time certifying algorithms to recognize split graphs, threshold graphs, chain graphs, co-chain graphs and trivially perfect graphs, with sublinear certificates for negative output. In case of membership in a given graph class our algorithms provide as certificate a structure for the input graph that characterizes the class, and in case of non-membership they provide as ...

2012
G. Michaelson

This document defines a standard profile for X.509 certificates for the purpose of supporting validation of assertions of "right-of-use" of Internet Number Resources (INRs). The certificates issued under this profile are used to convey the issuer’s authorization of the subject to be regarded as the current holder of a "right-of-use" of the INRs that are described in the certificate. This docume...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید