نتایج جستجو برای: first certificate

تعداد نتایج: 1448969  

Journal: :Journal of Education, Humaniora and Social Sciences 2023

The problem in this research, the transfer of rights to land that has not been bersertipikat through a purchase agreement, an effort increase certainty and legal protection sale yet bersertipikat, obstacles registration sales have certified Land. result discussion transitional form property on buying selling their execution Medan namely does certificate, it must first be converted make soil bas...

2006
Shaomin Zhang Huitao Gong Baoyi Wang

In grid environment, there are many administrative domains, each domain has its own CA, and entities in different domains need authentication when accessing each other. The OCSP (Online Certificate Status Protocol) stands out due to its ability to carry near real time certificate status information and meet the need of grid. The paper proposes an extended OCSP protocol that can provide trust st...

Journal: :RFC 2010
Sean Turner Santosh Chokhani

This document defines the syntax and semantics for the Clearance attribute and the Authority Clearance Constraints extension in X.509 certificates. The Clearance attribute is used to indicate the clearance held by the subject. The Clearance attribute may appear in the subject directory attributes extension of a public key certificate or in the attributes field of an attribute certificate. The A...

Journal: :Concurrency and Computation: Practice and Experience 2014
Jiguo Li Haiting Du Yichen Zhang Tao Li Yuexin Zhang

Certificate-based signature computation is often performed on insecure devices where the signature key is easy to be exposed. To reduce the influence of key exposure, we introduce key-insulated mechanism into certificate-based cryptography and formalize the notion and security model of the certificate-based key-insulated signature scheme. We then present a certificate-based key-insulated signat...

Journal: :CoRR 2012
Balachandra K. V. Prema Mamatha Balachandra

The Public Key Infrastructure(PKI) provides facilities for data encryption, digital signature and time stamping. It is a system where different authorities verify and authenticate the validity of each participant with the use of digital certificates. A Certificate Policy (CP) is a named set of rules and it indicates the applicability of a certificate in a Public Key Infrastructure. Sometimes tw...

2014
A. M. Hegland

Mobile ad-hoc networks are self-organizing as well as self configurable with an open network environment. The nodes during this network will be a part of can freely leave from the network. Therefore, the wireless and dynamic natures of MANET create them a lot of vulnerable in the direction of numerous varieties of security attacks than their wired counterparts. To ensure the secure network serv...

2005
Javier López Rolf Oppliger Günther Pernul

In spite of the fact that there are several companies that (try to) sell public key certificates, there is still no unified or standardized classification scheme that can be used to compare and put into perspective the various offerings. In this paper, we try to start filling this gap and propose a four-dimensional scheme that can be used to uniformly describe and classify public key certificat...

1999
Thomas A. Wikle

This paper presents an overview of GIS certificate programs available through colleges and universities in the United States and Canada. It is argued that by presenting a structured sequence of coursework, GIS certificate programs have begun to address the varied educational goals of both traditional students and non-degree professionals. A survey of certificate programs listed on the World Wid...

2008
Gilles Barthe César Kunz

In a Proof-Carrying Code scenario, certificate generation remains a challenging problem. Typically, it is implemented as a compiler module that targets low-level executable code. Hence, since automatic, the properties under verification are limited to very simple safety policies. Discharging verification conditions automatically for arbitrarily complex properties is unfeasible. Therefore, it re...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید