نتایج جستجو برای: first certificate

تعداد نتایج: 1448969  

2017
Amiya Bhatia Leonardo Zanini Ferreira Aluísio J D Barros Cesar Gomes Victora

BACKGROUND Birth registration, and the possession of a birth certificate as proof of registration, has long been recognized as a fundamental human right. Data from a functioning civil registration and vital statistics (CRVS) system allows governments to benefit from accurate and universal data on birth and death rates. However, access to birth certificates remains challenging and unequal in man...

2015
Yingdi Yu

As every data is signed in Named Data Networking (NDN), public key management becomes critical. The public key management requires a well-defined certificate format and several systems and protocols to support certificate distribution and revocation. In this paper, we proposed the new NDN certificate format, discussed several approaches of serving certificates in NDN. We also discuss how to rev...

Journal: :Electr. J. Comb. 1998
Jeffrey L. Poet Bryan L. Shader

A score certificate for a tournament, T , is a collection of arcs of T which can be uniquely completed to a tournament with the same scorelist as T ’s, and the score certificate number of T is the least number of arcs in a score certificate of T . Upper bounds on the score certificate number of upset tournaments are derived. The upset tournaments on n vertices are in one–to–one correspondence w...

2007
J. A. De Loera Jon Lee

Systems of polynomial equations over the complex or real numbers can be used to model combinatorial problems. In this way, a combinatorial problem is feasible (e.g. a graph is 3-colorable, hamiltonian, etc.) if and only if a related system of polynomial equations has a solution. In the first part of this paper, we construct new polynomial encodings for the problems of finding in a graph its lon...

2006
Elvira Albert Puri Arenas Germán Puebla Manuel Hermenegildo

Abstraction-Carrying Code (ACC) has recently been proposed as a framework for mobile code safety in which the code supplier provides a program together with an abstraction whose validity entails compliance with a predefined safety policy. The abstraction plays thus the role of safety certificate and its generation is carried out automatically by a fixed-point analyzer. The advantage of providin...

Journal: :JAMA 2002
Mary S Vaughan-Sarrazin Edward L Hannan Carol J Gormley Gary E Rosenthal

CONTEXT Certificate of need regulation was designed to control health care costs by preventing health care facilities from expanding unnecessarily. While there have been several studies investigating whether these regulations have affected health care investment, few have evaluated the relationship between certificate of need regulation and quality of care. OBJECTIVE To compare risk-adjusted ...

2006
Leslie Lamport

Celebrity is not fame, but it too can be measured. A version of this paper, somewhat mangled by the editor, appears in Annals of Improbable Research 12, 1 (Jan/Feb 2006), 14–15. Fame is being known. Celebrity is being known by your first name. Monica Lewinsky became famous when people learned of her presidential activities. She became a celebrity when people called her Monica. Schulman [1, 2, 3...

2018

The Public Key Infrastructure (PKI) protects users from malicious man-in-the-middle attacks by having trusted Certificate Authorities (CAs) vouch for the identity of servers on the internet through digitally signed certificates. Ironically, the mechanism CAs use to issue certificates is itself vulnerable to man-in-the-middle attacks by network-level adversaries. Autonomous Systems (ASes) can ex...

Journal: :I. J. Network Security 2018
Sujuan Li Yi Mu Mingwu Zhang

Smooth projective hashing was firstly introduced by Cramer and Shoup (EuroCrypt’02) as a tool to construct efficient chosen-ciphertext-secure public key encryption schemes. Since then, they have found many other applications, such as password-based authenticated key exchange, oblivious transfer, zero-knowledge arguments et al. Certificate-based encryption (CBE) not only eliminates third-party q...

2006
Chengyu Ma Nan Hu Yingjiu Li

Public key infrastructure has been proposed as a promising foundation for verifying the authenticity of communicating parties and transferring trust over the internet. One of the key issues in public key infrastructure is how to manage certificate revocations. Various technical solutions dealing with key revocation have been proposed. However, to the best of our best knowledge, no rigorous effo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید