Search

Your search keyword '"X.509"' showing total 492 results

Search Constraints

Start Over You searched for: Descriptor "X.509" Remove constraint Descriptor: "X.509"
492 results on '"X.509"'

Search Results

1. Fully Hybrid TLSv1.3 in WolfSSL on Cortex-M4

2. Decentralized Zone-Based PKI: A Lightweight Security Framework for IoT Ecosystems.

3. A Blockchain-Based Decentralized Public Key Infrastructure Using the Web of Trust.

4. A Blockchain-Based Decentralized Public Key Infrastructure Using the Web of Trust

5. RSA Keys Quality in a Real-world Organizational Certificate Dataset: a Practical Outlook

6. Verifying X.509 Certificate Extensions

8. Developing a Webpage Phishing Attack Detection Tool

9. Offline Access to a Vehicle via PKI-Based Authentication

11. Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications.

12. How to Survive Identity Management in the Industry 4.0 Era

13. A Novel Regular Format for X.509 Digital Certificates

14. Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications

15. Lightweight certificate revocation for low-power IoT with end-to-end security

16. An Implementation Suite for a Hybrid Public Key Infrastructure

17. Analysis of theoretical security level of PDF Encryption mechanism based on X.509 certificates

18. Recent Advances of the Cloud Platform Delivered in the Infrastructure as a Service Model for the PL-Grid Scientific Communities

19. OVERVIEW OF TLS CERTIFICATE REVOCATION MECHANISMS.

22. X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle

23. Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML

24. Systematic parsing of X.509: Eradicating security issues with a parse tree.

25. Extending UNICORE 5 Authentication Model by Supporting Proxy Certificate Profile Extensions

26. Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications

27. Towards Trustworthy and Secure Internet of Things Devices : Using hardware-assisted Trusted Execution and Automated Certification

32. Recursive Certificate Structures for X.509 Systems

34. Public Key Authentication and Key Agreement in IoT Devices With Minimal Airtime Consumption.

35. Cecoin: A decentralized PKI mitigating MitM attacks

37. Reducing e-commerce risks using digital certificates

38. On Re-engineering the X.509 PKI with Executable Specification for Better Implementation Guarantees

39. All your Credentials are Belong to Us: On Insecure WPA2-Enterprise Configurations

40. How to Survive Identity Management in the Industry 4.0 Era

41. Longitudinal analysis of the certificate chains of big tech company domains

42. Longitudinal characterization of X.509 revocation statuses : A framework for monitoring newly issued certificates from the most popular Certificate Transparency logs

43. An Implementation Suite for a Hybrid Public Key Infrastructure

44. The Prediction of Serial Number in OpenSSL’s X.509 Certificate

45. Relay Racing with X.509 Mayflies : An Analysis of Certificate Replacements and Validity Periods in HTTPS Certificate Logs

46. Let’s Attest! Multi-modal Certificate Exchange for the Web of Trust

47. Longitudinell analys av certifikatkedjor till domäner tillhörande stora teknikföretag

48. PLANNING FOR PKI WITHIN THE EDUCATIONAL ENVIRONMENT.

49. Issuance of Proxy Certificate Residing In Web Portal By Browser Based Digital Certificate Through HyperText Transfer Protocol.

50. ACCESS CONTROL BASED ON ATTRIBUTE CERTIFICATES.

Catalog

Books, media, physical & digital resources