Search

Your search keyword '"X.509"' showing total 92 results

Search Constraints

Start Over You searched for: Descriptor "X.509" Remove constraint Descriptor: "X.509" Publication Type Electronic Resources Remove constraint Publication Type: Electronic Resources
92 results on '"X.509"'

Search Results

1. Lightweight certificate revocation for low-power IoT with end-to-end security

2. Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications

3. Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications

4. Towards Trustworthy and Secure Internet of Things Devices : Using hardware-assisted Trusted Execution and Automated Certification

5. Towards Trustworthy and Secure Internet of Things Devices : Using hardware-assisted Trusted Execution and Automated Certification

6. Towards Trustworthy and Secure Internet of Things Devices : Using hardware-assisted Trusted Execution and Automated Certification

7. Towards Trustworthy and Secure Internet of Things Devices : Using hardware-assisted Trusted Execution and Automated Certification

8. Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications

9. Towards Trustworthy and Secure Internet of Things Devices : Using hardware-assisted Trusted Execution and Automated Certification

10. How to Survive Identity Management in the Industry 4.0 Era

11. How to Survive Identity Management in the Industry 4.0 Era

12. Longitudinal analysis of the certificate chains of big tech company domains

13. Longitudinal characterization of X.509 revocation statuses : A framework for monitoring newly issued certificates from the most popular Certificate Transparency logs

14. Longitudinal characterization of X.509 revocation statuses : A framework for monitoring newly issued certificates from the most popular Certificate Transparency logs

15. How to Survive Identity Management in the Industry 4.0 Era

16. Longitudinal analysis of the certificate chains of big tech company domains

17. Relay Racing with X.509 Mayflies : An Analysis of Certificate Replacements and Validity Periods in HTTPS Certificate Logs

18. Relay Racing with X.509 Mayflies : An Analysis of Certificate Replacements and Validity Periods in HTTPS Certificate Logs

19. Migration of Signing Algorithms : An investigation in migration of signing algorithms used in certificate authorities.

20. Migration of Signing Algorithms : An investigation in migration of signing algorithms used in certificate authorities.

21. Analysis of free SSL/TLS Certificates and their implementation as Security Mechanism in Application Servers.

22. Analysis of free SSL/TLS Certificates and their implementation as Security Mechanism in Application Servers.

23. Analysis of free SSL/TLS Certificates and their implementation as Security Mechanism in Application Servers.

24. How Certificate Transparency Impact the Performance

25. Analysis of free SSL/TLS Certificates and their implementation as Security Mechanism in Application Servers.

26. Analysis of free SSL/TLS Certificates and their implementation as Security Mechanism in Application Servers.

27. Analysis of free SSL/TLS Certificates and their implementation as Security Mechanism in Application Servers.

28. Analysis of free SSL/TLS Certificates and their implementation as Security Mechanism in Application Servers.

29. Analysis of free SSL/TLS Certificates and their implementation as Security Mechanism in Application Servers.

30. How Certificate Transparency Impact the Performance

31. Modernizing forms at KTH : Using Digital Signatures

32. Certificate Transparency in Theory and Practice

33. Certificate Transparency in Theory and Practice

34. Modernizing forms at KTH : Using Digital Signatures

35. Confusa : A cross federated personal certificate portal

36. SAMSON : Secure Access for Medical Smart cards Over Networks

37. Zabezpečení v IP sítích s technologií VoIP

38. Reducing e-commerce risks using digital certificates

39. Extending UNICORE 5 authentication model by supporting proxy certificate profile extensions

40. Refined Access Control in a Distributed Environment

41. Refined Access Control in a Distributed Environment

42. Elektronický podpis v praxi

43. Bezpečnost webových služeb z pohledu spotřebitele služby

44. Detekce a analýza přenosů využívajících protokoly SSL/TLS

45. Elektronické zabezpečení zdravotnické dokumentace v prostředí zdravotnického IS

46. Bezpečnost webových služeb z pohledu poskytovatele služby

47. Webová aplikace pro správu certifikátů

48. Technologické a právní limity elektronického podpisu v souvislosti s identifikací podepisující osoby

49. Anonymní pohyb v síti internet

50. Bezpečnost webových služeb z pohledu poskytovatele služby

Catalog

Books, media, physical & digital resources