Works matching DE "CERTIFICATE authority"
Results: 32
S/MIME Certificate Management through DNS DANE: A NEW APPROACH.
- Published in:
- ISSA Journal, 2018, v. 16, n. 6, p. 20
- By:
- Publication type:
- Article
System Dynamics Modeling of the Massachusetts SREC Market.
- Published in:
- Sustainability (2071-1050), 2010, v. 2, n. 9, p. 2746, doi. 10.3390/su2092746
- By:
- Publication type:
- Article
HTTPAS: active authentication against HTTPS man-in-the-middle attacks.
- Published in:
- IET Communications (Wiley-Blackwell), 2016, v. 10, n. 17, p. 2308, doi. 10.1049/iet-com.2016.0331
- By:
- Publication type:
- Article
Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited.
- Published in:
- Computer Journal, 2015, v. 58, n. 10, p. 2748, doi. 10.1093/comjnl/bxv045
- By:
- Publication type:
- Article
A Secure Mechanism Design-Based and Game Theoretical Model for MANETs.
- Published in:
- Mobile Networks & Applications, 2010, v. 15, n. 2, p. 191, doi. 10.1007/s11036-009-0164-7
- By:
- Publication type:
- Article
ACCESSING SERVICES WITH CLIENT DIGITAL CERTIFICATES: A SHORT REPORT FROM THE DCOCE PROJECT.
- Published in:
- New Review of Information Networking, 2004, v. 10, n. 2, p. 193, doi. 10.1080/13614570500091940
- By:
- Publication type:
- Article
Reference materials characterized for impurities in uranium matrices: An overview and re-evaluation of the NBL CRM 124 series.
- Published in:
- Journal of Radioanalytical & Nuclear Chemistry, 2009, v. 279, n. 2, p. 659, doi. 10.1007/s10967-008-7357-6
- By:
- Publication type:
- Article
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order.
- Published in:
- Journal of Cryptology, 2006, v. 19, n. 4, p. 463, doi. 10.1007/s00145-006-0224-0
- By:
- Publication type:
- Article
IMPLEMENTING RSA ALGORITHM FOR FULLY DISTRIBUTED CERTIFICATE AUTHORITY IN MANET.
- Published in:
- Journal of Information Systems & Operations Management, 2013, v. 7, n. 1, p. 172
- By:
- Publication type:
- Article
iDispatcher: A unified platform for secure planet-scale information dissemination.
- Published in:
- Peer-to-Peer Networking & Applications, 2013, v. 6, n. 1, p. 46, doi. 10.1007/s12083-012-0128-8
- By:
- Publication type:
- Article
Practical Certificateless Aggregate Signatures from Bilinear Maps.
- Published in:
- Journal of Information Science & Engineering, 2010, v. 26, n. 6, p. 2093
- By:
- Publication type:
- Article
A new certificateless multiple key agreement scheme.
- Published in:
- Discrete Mathematics, Algorithms & Applications, 2017, v. 9, n. 1, p. -1, doi. 10.1142/S1793830917500021
- By:
- Publication type:
- Article
Key Authentication Scheme-based on Discrete Logarithms and Chinese Remainder Theorem.
- Published in:
- Defence Science Journal, 2016, v. 66, n. 6, p. 590, doi. 10.14429/dsj.66.9649
- By:
- Publication type:
- Article
Enhanced Security Using Cluster Based Certificate Management and ECC-CRT Key Agreement Schemes in Mobile Ad hoc Networks.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 4, p. 6131, doi. 10.1007/s11277-017-4830-y
- By:
- Publication type:
- Article
Quantum Group Proxy Digital Signature based on Quantum Fourier Transform by Using Blinded and Non Blinded Trent.
- Published in:
- International Journal of Information Security Science, 2017, v. 6, n. 4, p. 79
- By:
- Publication type:
- Article
Trust Darknet: Control and Compromise in the Internet's Certificate Authority Model.
- Published in:
- IEEE Internet Computing, 2013, v. 17, n. 3, p. 18, doi. 10.1109/MIC.2013.27
- By:
- Publication type:
- Article
Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks.
- Published in:
- Multimedia Tools & Applications, 2013, v. 66, n. 2, p. 325, doi. 10.1007/s11042-011-0789-y
- By:
- Publication type:
- Article
Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 13, p. 2214, doi. 10.1002/sec.1165
- By:
- Publication type:
- Article
Certificate Revocation in Mobile Ad Hoc Networks with a Threshold value.
- Published in:
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 3, p. 488
- By:
- Publication type:
- Article
Accountable and Transparent TLS Certificate Management: An Alternate Public-Key Infrastructure with Verifiable Trusted Parties.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/8527010
- By:
- Publication type:
- Article
Security Issues of the Digital Certificates within Public Key Infrastructures.
- Published in:
- Informatica Economica, 2009, v. 13, n. 1, p. 16
- By:
- Publication type:
- Article
Blind Collective Signature Protocol.
- Published in:
- Computer Science Journal of Moldova, 2011, v. 19, n. 1, p. 80
- By:
- Publication type:
- Article
Design and implementation of a lightweight online certificate validation service.
- Published in:
- Telecommunication Systems, 2009, v. 41, n. 3, p. 229, doi. 10.1007/s11235-009-9144-2
- By:
- Publication type:
- Article
A Taxonomy of Ring Signature Schemes: Theory and Applications.
- Published in:
- IETE Journal of Research, 2013, v. 59, n. 4, p. 376, doi. 10.4103/0377-2063.118032
- By:
- Publication type:
- Article
THE ELECTRONIC SIGNATURE.
- Published in:
- Annals of the University of Oradea, Economic Science Series, 2009, v. 18, n. 4, p. 940
- By:
- Publication type:
- Article
Towards Secure Localized Certificate Revocation in Mobile Ad-Hoc Networks.
- Published in:
- IETE Technical Review, 2017, v. 34, n. 5, p. 561, doi. 10.1080/02564602.2016.1215270
- By:
- Publication type:
- Article
Time to train: The impact of the introduction of an additional NCEPOD role on trainee index procedure numbers within a dedicated emergency surgery unit.
- Published in:
- Bulletin of The Royal College of Surgeons of England, 2018, v. 100, n. 4, p. 163, doi. 10.1308/rcsbull.2018.E163
- By:
- Publication type:
- Article
A Secure Mobile Ad hoc Network Based on Distributed Certificate Authority.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2011, v. 36, n. 2, p. 245, doi. 10.1007/s13369-010-0018-4
- By:
- Publication type:
- Article
User Authentication Algorithm Guaranteeing Reusability of Biometric Data in BioPKI System.
- Published in:
- Wireless Personal Communications, 2017, v. 93, n. 1, p. 67, doi. 10.1007/s11277-016-3595-z
- By:
- Publication type:
- Article
Applying Pebble-Rotating Game to Enhance the Robustness of DHTs.
- Published in:
- PLoS ONE, 2013, v. 8, n. 6, p. 1, doi. 10.1371/journal.pone.0065460
- By:
- Publication type:
- Article
IBFWA: Integrated Bloom Filter in Watchdog Algorithm for hybrid black hole attack detection in MANET.
- Published in:
- Information Security Journal: A Global Perspective, 2017, v. 26, n. 1, p. 49, doi. 10.1080/19393555.2016.1274805
- By:
- Publication type:
- Article
An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad-hoc Networks.
- Published in:
- International Arab Journal of Information Technology (IAJIT), 2012, v. 9, n. 3, p. 291
- By:
- Publication type:
- Article