搜索结果: 1-15 共查到“certificate”相关记录51条 . 查询时间(0.468 秒)
A certificate thumbprint is a hash of a certificate, computed over all certificate data and its signature. Thumbprints are used as unique identifiers for certificates, in applications when making trus...
qSCMS: Post-quantum certificate provisioning process for V2X
Vehicular communications (V2X) post-quantum security lattice-based cryptography
2019/1/4
Security and privacy are paramount in the field of intelligent transportation systems (ITS). This motivates many proposals aiming to create a Vehicular Public Key Infrastructure (VPKI) for managing ve...
The security of web communication via the SSL/TLS protocols relies on safe distributions of public keys associated with web domains in the form of X.509X.509 certificates. Certificate authorities (CAs...
Blind Certificate Authorities
anonymity MPC TLS
2018/11/2
We explore how to build a blind certificate authority (CA). Unlike conventional CAs, which learn the exact identity of those registering a public key, a blind CA can simultaneously validate an identit...
Incorporating an Entrepreneurial Certificate into the Pharmacy Curriculum
Incorporating Entrepreneurial Certificate
2018/11/22
Objective. To describe the implementation and assessment of an entrepreneurial certificate program within an elective.
Methods. An entrepreneurial certificate program through the Kauffman Foundation ...
Binary Hash Tree based Certificate Access Management
Binary tree certificate access management
2017/8/10
We present a certificate access management system to support the USDOT's proposed rule on Vehicle-to-Vehicle (V2V) communications, Federal Motor Vehicle Safety Standard (FMVSS) No.~150. Our proposal, ...
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures
signatures subversion mass surveillance
2016/12/8
This paper presents highly efficient designs of double authentication preventing signatures (DAPS). In a DAPS, signing two messages with the same first part and differing second parts reveals the sign...
Secure Logging Schemes and Certificate Transparency
Certificate Transparency public key infrastructures (PKI) logging schemes
2016/5/11
Since hundreds of certificate authorities (CAs) can issue browser-trusted certificates, it can be difficult for domain owners to detect certificates that have been fraudulently issued for their domain...
Qualitative Analysis of Written Reflections during a Teaching Certificate Program
teaching certifi cate program refl ection qualitative teaching development
2016/3/1
Objective. To evaluate the success of a teaching certificate program by qualitatively evaluating the
content and extent of participants’ reflections.
Methods. Two investigators independe...
A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing
Proxy signature certificate-based message recovery
2016/1/26
In this paper, we propose the first provable secure certificate-based proxy signature with message
recovery without bilinear pairing. The notion of certificate-based cryptography was initially
intro...
Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction
authenticated key agreement certificated-based cryptography public key repalcement attack
2016/1/3
Certificate-based cryptography is a new public-key cryptographic paradigm that has very appealing features, namely it simplifies the certificate management problem in traditional public key cryptograp...
Certificate-Based Encryption Resilient to Key Leakage
certificate-based encryption master secret key leakage dual system encryption
2015/12/31
Certificate-based encryption (CBE) is an important class of public key encryption but the
existing schemes are secure only under the premise that the decryption key (or private key) and master
priva...
Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming
secret sharing threshold cryptography zero knowledge
2015/12/31
For many applications of secure multiparty computation it is natural to demand that the output of the protocol is verifiable. Verifiability should ensure that incorrect outputs are always rejected, ev...
Controller coefficient truncation using Lyapunov performance certificate
Delete coefficient linear controller coefficient of linear matrix inequality lmi the numerical values
2015/8/7
We describe a method for truncating the coefficients of a linear controller while guaranteeing that a given set of relaxed performance constraints is met. Our method sequentially and greedily truncate...
Controller Coefficient Truncation Using Lyapunov Performance Certificate
coeffi cient truncation controller design LMI methods
2015/7/9
We describe a method for truncating the coefficients of a linear controller while guaranteeing that a given set of relaxed performance constraints is met. Our method sequentially and greedily truncate...