نتایج جستجو برای: first certificate

تعداد نتایج: 1448969  

2003
S. Farrell

This document describes the Internet X.509 Public Key Infrastructure (PKI) Certificate Management Protocol (CMP). Protocol messages are defined for X.509v3 certificate creation and management. CMP provides online interactions between PKI components, including an exchange between a Certification Authority (CA) and a client system. Adams & Farrell Expires Oct. 2003 [Page 1] Introduction and Termi...

2005
Deepti Joshi Kamesh Namuduri Ravi Pendse

Security poses a major challenge in ad hoc networks today due to the lack of fixed or organizational infrastructure. This paper proposes a modification to the existing “fully distributed certificate authority” scheme for ad hoc networks. In the proposed modification, redundancy is introduced by allocating more than one share to each node in order to increase the probability of creating the cert...

2015
Megha R Jarang M V Nimbalkar

Mobile ad hoc networks (MANETs) have attracted more attention due to their mobility and simplicity of arrangement. However, the wireless and dynamic nature renders them more suspicious to various types of security attacks than the wired networks. To meet these challenges, certificate revocation is an important component for secure network communications. Certificate revocation is used to segreg...

2003
Mahantesh Halappanavar Ravi Mukkamala

In the current public-key infrastructure (PKI) schemes based on X.509, a relying party must validate a user’s certificate as well as the existence of a path from its trust points to the CA of the certificate. The latter part is referred to as certificate path validation. In this paper, we suggest an efficient certificate path validation scheme (ECPV) that employs delegation with efficient compu...

2009
H. Park Y. Won J. Lee

This document defines a practical architecture and protocols for offering privacy for a user who requests and uses an X.509 certificate containing a pseudonym, while still retaining the ability to map such a certificate to the real user who requested it. The architecture is compatible with IETF certificate request formats such as PKCS10 (RFC 2986) and CMC (RFC 5272). The architecture separates ...

2008

a. Administrative conditions for new students: High school certificate Fill in enrolment form including personal data of student Present photocopy of certificate legalized by appropriate authority (5 copies) and present original certificate. Provide 2 copies of latest pass photo 1 x 1.5 cm. and 4 copies 3 x 4 cm. Provide two photocopies of legalized birth certificate Provide a testimony from th...

2009
David Furniss

The Minerals and Petroleum Resources Act (MRPDA) no 28 of 2002 of South Africa states that the holder of a mining permit remains liable for environmental damage until a closure certificate has been issued, but does not stipulate the environmental standards required to obtain such a certificate. Monitoring of surface mining environments requires a consistent, repeatable and efficient method that...

2004
Bo Gyeong Kang Je Hong Park Sang Geun Hahn

In this paper, we propose the security notion of certificate-based signature that uses the same parameters and certificate revocation strategy as the encryption scheme presented at Eurocrypt 2003 by Gentry. Certificate-based signature preserves advantages of certificatebased encryption, such as implicit certification and no private key escrow. We present concrete certificate-based signature sch...

Journal: :Computers & Security 2015
Mohammad Masdari Sam Jabbehdari Jamshid Bagherzadeh Ahmad Khademzadeh

Each public key infrastructure needs an efficient certificate status validation method to exclude the revoked certificates from network. In this paper, we present a novel certificate validation scheme called E-ADOPT or Enhanced-ADOPT which utilizes a new kind of certificate status information. In this solution, we modify the OCSP response messages to carry information about the accusations issu...

2012
Aina Niemetz Mathias Preiner Florian Lonsing Martina Seidl Armin Biere

A certificate of (un)satisfiability for a quantified Boolean formula (QBF) represents concrete assignments to the variables, which act as witnesses for its truth value. Certificates are highly requested for practical applications of QBF like formal verification and model checking. We present an integrated set of tools realizing resolution-based certificate extraction for QBF in prenex conjuncti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید