نتایج جستجو برای: first certificate

تعداد نتایج: 1448969  

Journal: :Library Hi Tech 2006
Susanne Dobratz Frank Scholze

Purpose: Overview on certification of institutional repositories as a means to support Open Access in Germany and description of the DINI Certificate 2006 developed by DINI, the German Initiative for Networked Information. Design/methodology/approach: The DINI Certificate for Document and Publication Repositories shows potential users and authors of digital documents that a certain level of qua...

2014
Carla L. DeSisto Shin Y. Kim Andrea J. Sharma

INTRODUCTION The true prevalence of gestational diabetes mellitus (GDM) is unknown. The objective of this study was 1) to provide the most current GDM prevalence reported on the birth certificate and the Pregnancy Risk Assessment Monitoring System (PRAMS) questionnaire and 2) to compare GDM prevalence from PRAMS across 2007-2008 and 2009-2010. METHODS We examined 2010 GDM prevalence reported ...

2013
Yang Lu Jiguo Li

Certificate-based cryptography is a new paradigm that combines traditional public-key cryptography and identity-based cryptography. It not only simplifies the cumbersome certificate management in traditional public-key cryptography, but also eliminates the key escrow and distribution problems inherent in identity-based cryptography. However, all constructions of certificate-based encryption in ...

2012
M. Suguna P. Subathra

MANETs are an ideal technology to deploy spontaneous wireless infrastructure-less networks, either for military or civilian applications. The absence of centralized administration and infrastructure-less nature gives rise to authentication and key management problems in the MANETs. Though there are a number of authentication mechanisms available for wired and infrastructure based wireless netwo...

2015
M. Kannan E. Dinesh

Certificate revocation is an important security component in mobile ad hoc networks (MANET). Securing network from various kinds of Attacks (MANET) plays an important role. Certificate revocation mechanisms play an important role in securing a network. The main challenge of certificate revocation is to revoke certificates of malicious nodes promptly and accurately. In this paper we use Cluster ...

Journal: :Journal of Object Technology 2004
Douglas A. Lyon

This paper describes the use of the Thawte’s “Web of Trust” X.509 certificates for signing and distributing executable Jar resources. A keytool wizard (called the Initium X.509 Certificate Wizard) was developed in order to help with the importation and management of certificates. A signed Jar file generally indicates that the signer authorizes the contents. Signing is accomplished using a certi...

Journal: :Security and Communication Networks 2023

With the development of cloud services and Internet Things, integration heterogeneous systems is becoming increasingly complex. Identity management important in coordination various systems, public key infrastructure (PKI) widely known as an identity methods. In PKI, a certificate authority (CA) acts trust point to guarantee entities such users, devices, services. However, traditional CAs that ...

2005
Omar Batarfi C. R. Snow

In this paper, we present an initial approach to the problem of specifying formally the requirements of the Certification Policy as published by a Certification Authority. The approach uses the XML language to describe the structure of the policy document, and attempts to provide a canonical representation of the document in order to allow the semantics of the policy to be described. The ultima...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید