Works matching DE "PUBLIC key infrastructure (Computer security)"
Results: 239
Improving the Security and Flexibility of One-Time Passwords by Signature Chains.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2003, v. 11, n. 3, p. 223
- By:
- Publication type:
- Article
Does Quantum Computing Mean R.I.P. PKI?
- Published in:
- ISSA Journal, 2020, v. 18, n. 5, p. 5
- By:
- Publication type:
- Article
Yes, Johnny Can Encrypt.
- Published in:
- ISSA Journal, 2019, v. 17, n. 1, p. 11
- By:
- Publication type:
- Article
SETEC Astronomy.
- Published in:
- ISSA Journal, 2017, v. 15, n. 11, p. 5
- By:
- Publication type:
- Article
Blockchain: the PKI of the Twenty- First Century?
- Published in:
- ISSA Journal, 2016, v. 14, n. 11, p. 8
- By:
- Publication type:
- Article
Secure Access Control in Distributed Environment.
- Published in:
- Information Sciences & Technologies: Bulletin of the ACM Slovakia, 2015, v. 7, n. 1, p. 1
- By:
- Publication type:
- Article
Security-Oriented Architecture for Managing IoT Deployments.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 10, p. 1315, doi. 10.3390/sym11101315
- By:
- Publication type:
- Article
Efficient Hierarchical Identity-Based Encryption System for Internet of Things Infrastructure.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 7, p. 913, doi. 10.3390/sym11070913
- By:
- Publication type:
- Article
A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems.
- Published in:
- Symmetry (20738994), 2016, v. 8, n. 9, p. 85, doi. 10.3390/sym8090085
- By:
- Publication type:
- Article
High-Rate Secure Key Distribution Based on Private Chaos Synchronization and Alternating Step Algorithms.
- Published in:
- International Journal of Bifurcation & Chaos in Applied Sciences & Engineering, 2020, v. 30, n. 2, p. N.PAG, doi. 10.1142/S0218127420500273
- By:
- Publication type:
- Article
Experiences in integrated data and research object publishing using GigaDB.
- Published in:
- International Journal on Digital Libraries, 2017, v. 18, n. 2, p. 99, doi. 10.1007/s00799-016-0174-6
- By:
- Publication type:
- Article
Certificate Revocation List Distribution Based on Road Map Distance Protocol (RMDP) in Vanet.
- Published in:
- International Review on Computers & Software, 2015, v. 10, n. 3, p. 300, doi. 10.15866/irecos.v10i3.5575
- By:
- Publication type:
- Article
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography.
- Published in:
- IET Communications (Wiley-Blackwell), 2016, v. 10, n. 14, p. 1795, doi. 10.1049/iet-com.2016.0091
- By:
- Publication type:
- Article
PKE-AET: Public Key Encryption with Authorized Equality Test.
- Published in:
- Computer Journal, 2015, v. 58, n. 10, p. 2686, doi. 10.1093/comjnl/bxv025
- By:
- Publication type:
- Article
Achieving Key Privacy and Invisibility for Unattended Wireless Sensor Networks in Healthcare.
- Published in:
- Computer Journal, 2014, v. 57, n. 4, p. 624, doi. 10.1093/comjnl/bxt046
- By:
- Publication type:
- Article
Certificate Revocation List Distribution System for the KAD Network.
- Published in:
- Computer Journal, 2014, v. 57, n. 2, p. 273, doi. 10.1093/comjnl/bxt037
- By:
- Publication type:
- Article
Autonomous Ant-based Public Key Authentication Mechanism for Mobile Ad-hoc Networks.
- Published in:
- Mobile Networks & Applications, 2016, v. 21, n. 1, p. 149, doi. 10.1007/s11036-016-0703-y
- By:
- Publication type:
- Article
Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks.
- Published in:
- Mobile Networks & Applications, 2013, v. 18, n. 3, p. 413, doi. 10.1007/s11036-012-0406-y
- By:
- Publication type:
- Article
An Efficient Certificateless Signcryption Scheme in the Standard Model.
- Published in:
- ISeCure, 2017, v. 9, n. 1, p. 3
- By:
- Publication type:
- Article
A Hybrid Approach to Secure Hierarchical Mobile IPv6 Networks.
- Published in:
- Computer Science & Information Systems, 2013, v. 10, n. 2, p. 913, doi. 10.2298/CSIS121114041G
- By:
- Publication type:
- Article
Equivalent keys in ℳℳultivariate uadratic public key systems.
- Published in:
- Journal of Mathematical Cryptology, 2011, v. 4, n. 4, p. 375, doi. 10.1515/JMC.2011.004
- By:
- Publication type:
- Article
Requiring Strong Credentials: What's Taking So Long?
- Published in:
- IT Professional, 2010, v. 12, n. 1, p. 57, doi. 10.1109/MITP.2010.34
- By:
- Publication type:
- Article
Mobile Certificate Based Network Services.
- Published in:
- Issues in Informing Science & Information Technology, 2013, v. 10, p. 413, doi. 10.28945/1819
- By:
- Publication type:
- Article
Securing Control Signaling in Mobile IPv6 with Identity-Based Encryption.
- Published in:
- Issues in Informing Science & Information Technology, 2009, v. 6, p. 649, doi. 10.28945/1087
- By:
- Publication type:
- Article
ACCESSING SERVICES WITH CLIENT DIGITAL CERTIFICATES: A SHORT REPORT FROM THE DCOCE PROJECT.
- Published in:
- New Review of Information Networking, 2004, v. 10, n. 2, p. 193, doi. 10.1080/13614570500091940
- By:
- Publication type:
- Article
The ultimate physical limits of privacy.
- Published in:
- Nature, 2014, v. 507, n. 7493, p. 443, doi. 10.1038/nature13132
- By:
- Publication type:
- Article
On Strong Simulation and Composable Point Obfuscation.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 2, p. 317, doi. 10.1007/s00145-013-9146-9
- By:
- Publication type:
- Article
A Public Key Cryptosystem Based on Non-abelian Finite Groups.
- Published in:
- Journal of Cryptology, 2009, v. 22, n. 1, p. 62, doi. 10.1007/s00145-008-9033-y
- By:
- Publication type:
- Article
An Improved Real-Quadratic-Field-Based Key Exchange Procedure.
- Published in:
- Journal of Cryptology, 2006, v. 19, n. 2, p. 211, doi. 10.1007/s00145-005-0357-6
- By:
- Publication type:
- Article
One Possible Model of Secure e/m-Government System.
- Published in:
- Information Systems Management, 2010, v. 27, n. 4, p. 320, doi. 10.1080/10580530.2010.514188
- By:
- Publication type:
- Article
CRITICAL SUCCESS FACTORS FOR MANAGING SYSTEMS INTEGRATION.
- Published in:
- Information Systems Management, 2006, v. 23, n. 2, p. 56, doi. 10.1201/1078.10580530/45925.23.2.20060301/92674.7
- By:
- Publication type:
- Article
An Internet of Things Based Multi-Level Privacy-Preserving Access Control for Smart Living.
- Published in:
- Informatics, 2018, v. 5, n. 2, p. 23, doi. 10.3390/informatics5020023
- By:
- Publication type:
- Article
Towards security recommendations for public-key infrastructures for production environments in the post-quantum era.
- Published in:
- EPJ Quantum Technology, 2021, v. 8, n. 1, p. 1, doi. 10.1140/epjqt/s40507-021-00104-z
- By:
- Publication type:
- Article
Plug-and-Charge and E-Roaming - Capabilities of the ISO/IEC 15118 for the E-Mobility Scenario.
- Published in:
- Automatisierungstechnik, 2014, v. 62, n. 4, p. 241, doi. 10.1515/auto-2014-0002
- By:
- Publication type:
- Article
SIGNCRYPTION ANALYZE.
- Published in:
- Journal of Information Systems & Operations Management, 2012, v. 6, n. 1, p. 86
- By:
- Publication type:
- Article
Compressible Multikey and Multi-Identity Fully Homomorphic Encryption.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/6619476
- By:
- Publication type:
- Article
A Collusion-Resistant Identity-Based Proxy Reencryption Scheme with Ciphertext Evolution for Secure Cloud Sharing.
- Published in:
- Security & Communication Networks, 2020, p. 1, doi. 10.1155/2020/8833693
- By:
- Publication type:
- Article
PRETTY (PRIVATE TELEPHONY SECURITY) - SECURING THE PRIVATE TELEPHONY INFRASTRUCTURE.
- Published in:
- Information & Security, 2012, v. 28, n. 1, p. 89, doi. 10.11610/isij.2807
- By:
- Publication type:
- Article
A Blockchain-Based Decentralized Public Key Infrastructure for Information-Centric Networks.
- Published in:
- Information (2078-2489), 2022, v. 13, n. 5, p. 264, doi. 10.3390/info13050264
- By:
- Publication type:
- Article
INFORMATION SOCIETY INFRASTRUCTURE AND COMMUNICATIONS WITHIN THE NATIONAL BOUNDARIES.
- Published in:
- Megatrend Review / Megatrend Revija, 2013, v. 10, n. 1, p. 209
- By:
- Publication type:
- Article
ENCRYPTION SYSTEM OVER THE SYMMETRICAL GROUP OF ORDER N.
- Published in:
- Studia Universitatis Babes-Bolyai, Informatica, 2010, v. 55, n. 1, p. 115
- By:
- Publication type:
- Article
Kademlia based routing on locator-ID separated networks for new generation networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2013, v. 6, n. 3, p. 294, doi. 10.1007/s12083-012-0166-2
- By:
- Publication type:
- Article
A distributed trust management model for mobile P2P networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2012, v. 5, n. 2, p. 193, doi. 10.1007/s12083-011-0103-9
- By:
- Publication type:
- Article
Decentralized certification scheme for secure admission in on-the-fly peer-to-peer systems.
- Published in:
- Peer-to-Peer Networking & Applications, 2012, v. 5, n. 2, p. 105, doi. 10.1007/s12083-011-0113-7
- By:
- Publication type:
- Article
Building trust of Blockchain-based Internet-of-Thing services using public key infrastructure.
- Published in:
- Enterprise Information Systems, 2022, v. 16, n. 12, p. 1, doi. 10.1080/17517575.2022.2037162
- By:
- Publication type:
- Article
The geopolitical vs. the network political: Internet designers and governance.
- Published in:
- International Journal of Media & Cultural Politics, 2013, v. 9, n. 3, p. 277, doi. 10.1386/macp.9.3.277_1
- By:
- Publication type:
- Article
Secure Communication via Synchronization of Lur'e Systems Using Sampled-Data Controller.
- Published in:
- Circuits, Systems & Signal Processing, 2014, v. 33, n. 1, p. 37, doi. 10.1007/s00034-013-9627-y
- By:
- Publication type:
- Article
A Privacy-Preserving V2I Authentication Scheme Without Certificates.
- Published in:
- Journal of Information Science & Engineering, 2017, v. 33, n. 4, p. 1025, doi. 10.6688/JISE.2017.33.4.11
- By:
- Publication type:
- Article
Attribute-Based Key-Insulated Encryption.
- Published in:
- Journal of Information Science & Engineering, 2011, v. 27, n. 2, p. 437
- By:
- Publication type:
- Article
Data Defense.
- Published in:
- Government Technology, 2008, v. 21, n. 4, p. 44
- By:
- Publication type:
- Article