نتایج جستجو برای: first certificate
تعداد نتایج: 1448969 فیلتر نتایج به سال:
Purpose: Overview on certification of institutional repositories as a means to support Open Access in Germany and description of the DINI Certificate 2006 developed by DINI, the German Initiative for Networked Information. Design/methodology/approach: The DINI Certificate for Document and Publication Repositories shows potential users and authors of digital documents that a certain level of qua...
INTRODUCTION The true prevalence of gestational diabetes mellitus (GDM) is unknown. The objective of this study was 1) to provide the most current GDM prevalence reported on the birth certificate and the Pregnancy Risk Assessment Monitoring System (PRAMS) questionnaire and 2) to compare GDM prevalence from PRAMS across 2007-2008 and 2009-2010. METHODS We examined 2010 GDM prevalence reported ...
Certificate-based cryptography is a new paradigm that combines traditional public-key cryptography and identity-based cryptography. It not only simplifies the cumbersome certificate management in traditional public-key cryptography, but also eliminates the key escrow and distribution problems inherent in identity-based cryptography. However, all constructions of certificate-based encryption in ...
MANETs are an ideal technology to deploy spontaneous wireless infrastructure-less networks, either for military or civilian applications. The absence of centralized administration and infrastructure-less nature gives rise to authentication and key management problems in the MANETs. Though there are a number of authentication mechanisms available for wired and infrastructure based wireless netwo...
Certificate revocation is an important security component in mobile ad hoc networks (MANET). Securing network from various kinds of Attacks (MANET) plays an important role. Certificate revocation mechanisms play an important role in securing a network. The main challenge of certificate revocation is to revoke certificates of malicious nodes promptly and accurately. In this paper we use Cluster ...
This paper describes the use of the Thawte’s “Web of Trust” X.509 certificates for signing and distributing executable Jar resources. A keytool wizard (called the Initium X.509 Certificate Wizard) was developed in order to help with the importation and management of certificates. A signed Jar file generally indicates that the signer authorizes the contents. Signing is accomplished using a certi...
With the development of cloud services and Internet Things, integration heterogeneous systems is becoming increasingly complex. Identity management important in coordination various systems, public key infrastructure (PKI) widely known as an identity methods. In PKI, a certificate authority (CA) acts trust point to guarantee entities such users, devices, services. However, traditional CAs that ...
In this paper, we present an initial approach to the problem of specifying formally the requirements of the Certification Policy as published by a Certification Authority. The approach uses the XML language to describe the structure of the policy document, and attempts to provide a canonical representation of the document in order to allow the semantics of the policy to be described. The ultima...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید