Search

Your search keyword '"X.509"' showing total 25 results

Search Constraints

Start Over You searched for: Descriptor "X.509" Remove constraint Descriptor: "X.509" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed
25 results on '"X.509"'

Search Results

1. Decentralized Zone-Based PKI: A Lightweight Security Framework for IoT Ecosystems.

2. A Blockchain-Based Decentralized Public Key Infrastructure Using the Web of Trust.

3. A Blockchain-Based Decentralized Public Key Infrastructure Using the Web of Trust

4. RSA Keys Quality in a Real-world Organizational Certificate Dataset: a Practical Outlook

5. Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications.

6. How to Survive Identity Management in the Industry 4.0 Era

7. Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications

8. An Implementation Suite for a Hybrid Public Key Infrastructure

9. Analysis of theoretical security level of PDF Encryption mechanism based on X.509 certificates

10. OVERVIEW OF TLS CERTIFICATE REVOCATION MECHANISMS.

11. Systematic parsing of X.509: Eradicating security issues with a parse tree.

12. Public Key Authentication and Key Agreement in IoT Devices With Minimal Airtime Consumption.

13. Reducing e-commerce risks using digital certificates

14. Lightweight certificate revocation for low-power IoT with end-to-end security.

15. Secure socket layer certificate verification: a learning automata approach.

16. CILogon: A federated X.509 certification authority for cyberinfrastructure logon.

17. Solving identity delegation problem in the e-government environment.

18. Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile.

19. Life-cycle management of X.509 certificates based on LDAP directories.

20. Theory and benefits of recursive certificate structures.

21. Security issues in the electronic transmission of prescriptions.

22. An Implementation Suite for a Hybrid Public Key Infrastructure.

23. Secure automated request processing software for DataGrid certification authorities

24. Certificate Based Authentication Mechanism for PMU Communication Networks Based on IEC 61850-90-5.

25. Not Reinventing PKI until We Have Something Better.

Catalog

Books, media, physical & digital resources