Academic literature on the topic 'Application for a certificate'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Application for a certificate.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Application for a certificate"

1

Mardianto, Is, and Kuswandi Kuswandi. "Implementasi Keamanan pada Transaksi Data Menggunakan Sertifikat Digital X.509." Jurnal ULTIMATICS 8, no. 1 (March 20, 2017): 1–10. http://dx.doi.org/10.31937/ti.v8i1.496.

Full text
Abstract:
Security issues have become a major issue on the Internet. One of the security methods that are widely used today is to implement a digital certificate. Digital certificates have evolved over time, one of which is the X.509 digital certificate. Digital certificates have been widely used as authentication applications, web network authentication and other authentication systems that require digital certificates. This research is carried out by implementing an X.509 digital certificate technology as a mobile web service with its client. Secure Hash Algorithm (SHA), Diffie-Hellman, and Advanced Encryption Standard (AES) are used to secure the data exchange transaction between the web service and mobile phone. SHA algorithm will be used for user authentication, Diffie-Hellman algorithm will be used for public key exchange and AES algorithms will be used for symmetric cryptography data. The results of the application of digital certificates, the SHA algorithm, Diffie-Hellman, and AES in mobile phone applications, provide security application running on web service. Index Terms—Digital Certificate, X.509, SHA, Diffie Hellman, AES
APA, Harvard, Vancouver, ISO, and other styles
2

Samala, Agariadne Dwinggo, and Bayu Ramadhani Fajri. "RANCANG BANGUN APLIKASI E-SERTIFIKAT BERBASIS WEB MENGGUNAKAN METODE PENGEMBANGAN WATERFALL." JURNAL TEKNIK INFORMATIKA 13, no. 2 (February 15, 2021): 147–56. http://dx.doi.org/10.15408/jti.v13i2.16470.

Full text
Abstract:
Certification is a determination given by a professional organization to someone to show that the person has competence, is able to do a specific job or task. Quality Assurance and Learning Development Institute Universitas Negeri Padang (LP3M UNP) currently still issues paper-based certificates manually for each training activity. Issuance of certificates manually turned out to be quite time consuming and inefficient. Then the absence of a verification system that can check the authenticity and ownership of certificates can provide opportunities for certificate forgery. So, it is very important to design and build a web-based electronic certificate application (e-certificate) that is able to generate certificates online and be able to verify the authenticity and ownership of the electronic certificates. This study uses a Research and Development (R&D) approach. This type of development method uses the waterfall approach. At the system design stage using the Unified Modeling Language (UML), and for the database using MySQL. The results of this study are web-based e-certificate applications that are designed successfully to support the process of generating and verifying the authenticity and ownership of electronic certificates online. Based on the results of testing the system with the black box method also shows that all the functionality of the e-certificate application that is designed to run very well and in accordance with user needs.
APA, Harvard, Vancouver, ISO, and other styles
3

Mashendra, Mashendra, and Deddy Mursanto. "Juridical Review of The Application of Digital Mapping (Plotting) of Land Ownership Rights in The Prevention of Multiple Certificates." Jurnal Hukum Volkgeist 5, no. 2 (June 24, 2021): 185–93. http://dx.doi.org/10.35326/volkgeist.v5i2.1081.

Full text
Abstract:
The implementation of land registration aims to create an accurate information center regarding land ownership. To ensure that land registration administration runs effectively, the Computerization of Land Activities (KKP) policy is implemented gradually and thoroughly. Even so, the application of a computerized system that is so sophisticated, still finds overlapping ownership of land titles. Overlapping the certificate will result in legal uncertainty for the certificate holder, because the main purpose listed is to get the certificate as valid evidence.. Sampling in this study was carried out purposively with a non-random sampling technique that focused only on land that had multiple certificates. The data analysis pattern in this study is based on qualitative methods. The findings of this study are thatThe implementation of Computerization of Land Activities (KKP) at BPN City of Baubau in preventing the occurrence of double certificates is carried out with all processes from the beginning of land registration to issuance of certificates and stored digitally.The factors that result in the occurrence of a double certificate can be seen from 2 (two) things, namely first, when viewed from the factor of the Community. Second, if it is seen from the human resource factor of the Land Officedue to carelessness and carelessness of the land officers.
APA, Harvard, Vancouver, ISO, and other styles
4

Sugiharto, Tito, and Mohammad Irwansyah. "Inovasi Pengembangan Sistem Informasi Pengelolaan Surat Keterangan Pendamping Ijazah Berbasis Web." JURNAL MEDIA INFORMATIKA BUDIDARMA 4, no. 2 (April 25, 2020): 325. http://dx.doi.org/10.30865/mib.v4i2.1903.

Full text
Abstract:
This research was aiming to produce a management information system for Diploma Companion Certificate (SKPI). The target of the research to be achieved is the existence of an information system that can be used to manage the filling and printing of Companion Certificates. Management information system This Certificate of Companion is made to be applied in the Informatics Engineering Study Program S1 Faculty of Computer Science, University of Kuningan. This study discusses how the process of designing and developing an information system for managing Diploma Certificates of Completion in the S1 Informatics Engineering Study Program. The absence of an application or information system for managing Diploma Certificates is a serious problem that must be considered. Managers of the S1 Informatics Engineering Study Program find it difficult in the process of making and filling Diploma Companion Certificates for their graduates. In the absence of a management information system, a Diploma of Companion Certificate, the process of making and filling with Certificate ofCompanion Certificate will take a long time. The method used in this study is Rational Unified Process (RUP). There are four stages in the use of this RUP method, namely the stages of inception, elaboration, construction and transition. The design model used in this study uses Unified Modeling Language (UML). The testing process is carried out using the Black Box Testing. Therefore, to solve these problems, an innovation is needed In the management ofa web-based Diploma Companion Certificate. It is expected that this information system can help and ease the Study Program in managing Diploma Companion Certificates.
APA, Harvard, Vancouver, ISO, and other styles
5

Lamont, Scott, Scott Brunero, and Swapnil Sharma. "Application and implications of Mental Health Act 2007 (NSW) certificate use in acute generalist settings." Australian Health Review 40, no. 2 (2016): 219. http://dx.doi.org/10.1071/ah15045.

Full text
Abstract:
Objective This retrospective study aimed to explore the appropriate application and implications of Mental Health Act 2007 (NSW) (MHA) certificate use in a metropolitan generalist hospital in New South Wales. Methods A de-identified MHA certificate review was undertaken within acute generalist medical and surgical specialties between June 2012 and May 2013. To assess differences, data were separated into two categories according to whether certificates were completed by psychiatry trainees or generalist medical officers. Analysis of indications for detention was also undertaken and qualitatively matched against legislative criteria. Results A total of 43 MHA certificates were included in the review, which highlighted missing elements in most certificates. Differences were found when professional consensus by the researchers was used to match documentation to legislative criteria. The researchers disagreed with nine of the 16 indications (mental illness/mental disorder) by the generalist medical officers and only one indication by a psychiatry trainee. Six of the certificates appeared to be related to lack of capacity and need for treatment of medical conditions, thus more related to Guardianship Act 1987 (NSW) applications. Conclusion This study highlights inconsistencies in legislative knowledge and requirements between professional groups. Education and training opportunities have been identified to ensure greater consistency in application of the MHA, preservation of patient rights and avoidance of stigma. MHA use in this setting should be exercised with caution and by appropriately trained individuals. What is known about the topic? The MHA and its state and territory counterparts provide for the treatment, care and support of people who have a mental illness and the protection of a person’s rights therein. Despite not being intended for application in generalist facilities, mental health legislation is widely used in generalist facilities and certificates are completed by generalist health professionals with limited training in this area of practice. What does this paper add? This study adds to the limited body of knowledge in relation to MHA detention in acute generalist facilities. Disparate preparation of medical officers in the use of this legislation has been identified, which has potential wider implications for patients beyond immediate care. What are the implications for practitioners? Inadequate attention to correct completion of MHA certificates and associated documentation could potentially invalidate detention, leaving healthcare professionals and institutions open to litigious claims that restrictive or coercive practices subsequent to the certificate’s completion were technically unlawful. Further, detention under the MHA, albeit temporarily, has potential human rights issues attached and wrongful detention could lead to longstanding issues relating to stigma.
APA, Harvard, Vancouver, ISO, and other styles
6

Chien, Hung-Yu. "Dynamic Public Key Certificates with Forward Secrecy." Electronics 10, no. 16 (August 19, 2021): 2009. http://dx.doi.org/10.3390/electronics10162009.

Full text
Abstract:
Conventionally, public key certificates bind one subject with one static public key so that the subject can facilitate the services of the public key infrastructure (PKI). In PKI, certificates need to be renewed (or revoked) for several practical reasons, including certificate expiration, private key breaches, condition changes, and possible risk reduction. The certificate renewal process is very costly, especially for those environments where online authorities are not available or the connection is not reliable. A dynamic public key certificate (DPKC) facilitates the dynamic changeover of the current public–private key pairs without renewing the certificate authority (CA). This paper extends the previous study in several aspects: (1) we formally define the DPKC; (2) we formally define the security properties; (3) we propose another implementation of the Krawczyk–Rabin chameleon-hash-based DPKC; (4) we propose two variants of DPKC, using the Ateniese–Medeiros key-exposure-free chameleon hash; (5) we detail two application scenarios.
APA, Harvard, Vancouver, ISO, and other styles
7

Agustin, Farida, Qurotul Aini, Alfiah Khoirunisa, and Efa Ayu Nabila. "Utilization of Blockchain Technology for Management E-Certificate Open Journal System." Aptisi Transactions on Management (ATM) 4, no. 2 (April 18, 2020): 134–39. http://dx.doi.org/10.33050/atm.v4i2.1293.

Full text
Abstract:
The application of blockchain technology in e-certificates in the open journal system is needed to validate and distribute managed e-certificates in each journal issue. With tools in the form of conceptualized and managed blockcerts allows users to use and verify the authenticity of e-certificates that are closely linked to the blockchain. Observation on the open journal system and applied blockchain tools in the form of blockcerts as a place to issue e-certificates with guaranteed security so that e-certificates are verified as well as managed data. Issuance of e-certificates is still considered unsafe because it can be easily forged. Specifically, this study produced two benefits, namely: (1) Issuance of e-certificates in an open journal system is more verified, data is managed and there will not be duplications or even falsification of e-certificates. (2) The reputation of the open journal system is better with a sense of trust. This research uses library study method by implementing e-certificate in an open journal system with blockchain technology tools such as blockcerts. In order that the results of the e-certificate issuance go well and to avoid any crime that threatens the authenticity of the e-certificate, this blockchain is used to guarantee that the e-certificate is safe and not easily falsified, duplicated or even easily replaced by those not granted access rights. By using blockchain technology, the data collected will be well managed and not easily falsified.
APA, Harvard, Vancouver, ISO, and other styles
8

Vimpari, Jussi, and Seppo Junnila. "Valuing green building certificates as real options." Journal of European Real Estate Research 7, no. 2 (July 29, 2014): 181–98. http://dx.doi.org/10.1108/jerer-06-2013-0012.

Full text
Abstract:
Purpose – The purpose of this study is first to evaluate whether real options analysis (ROA) is suitable for valuing green building certificates, and second to calculate the real option value of a green certificate in a typical office building setting. Green buildings are demonstrated as one of the most profitable climate mitigation actions. However, no consensus exists among industry professionals about how green buildings and specifically green building certificates should be valued. Design/methodology/approach – The research design of the study involves a theoretical part and an empirical part. In the theoretical part, option characteristics of green building certificates are identified and a contemporary real option valuation method is proposed for application. In the empirical part, the application is demonstrated in an embedded multiple case study design. Two different building cases (with and without green certificate) with eight independent cash flow valuations by eight industry professionals are used as data set for eight valuation case studies and analyses. Additionally, cross-case analysis is executed for strengthening the analysis. Findings – The paper finds that green certificates have several characteristics similar to real options and supports the idea of using ROA in valuing a green certificate. The paper also explains how option pricing theory and discounted cash flow (DCF) method deal with uncertainty and what shortcomings of DCF could be overcome by ROA. The results show that a mean real option value of 985,000 (or 8.8 per cent premium to the mean property value) was found for a Leadership in Energy and Environmental Design Platinum certificate in the Finnish property market. The main finding of the paper suggests that the contemporary real option valuation methods are appropriate to assess the monetary value and the uncertainty of a green building certificate. Originality/value – This is the first study to argue that option-pricing theory can be used for valuing green building certificates. The identification of the option characteristics of green building certificates and demonstration of the ROA in an empirical case makes questions whether the current mainstream investment analysis approaches are the most suitable methods for valuing green building certificates.
APA, Harvard, Vancouver, ISO, and other styles
9

Nguyen, Binh Minh, Thanh-Chung Dao, and Ba-Lam Do. "Towards a blockchain-based certificate authentication system in Vietnam." PeerJ Computer Science 6 (March 30, 2020): e266. http://dx.doi.org/10.7717/peerj-cs.266.

Full text
Abstract:
Anti-forgery information, transaction verification, and smart contract are functionalities of blockchain technology that can change the traditional business processes of IT applications. These functionalities increase the data transparency, and trust of users in the new application models, thus resolving many different social problems today. In this work, we take all the advantages of this technology to build a blockchain-based authentication system (called the Vietnamese Educational Certification blockchain, which stands for VECefblock) to deal with the delimitation of fake certificate issues in Vietnam. In this direction, firstly, we categorize and analyze blockchain research and application trends to make out our contributions in this domain. Our motivating factor is to curb fake certificates in Vietnam by applying the suitability of blockchain technology to the problem domain. This study proposed some blockchain-based application development principles in order to build a step by step VECefblock with the following procedures: designing overall architecture along with business processes, data mapping structure and implementing the decentralized application that can meet the specific Vietnamese requirements. To test system functionalities, we used Hyperledger Fabric as a blockchain platform that is deployed on the Amazon EC2 cloud. Through performance evaluations, we proved the operability of VECefblock in the practical deployment environment. This experiment also shows the feasibility of our proposal, thus promoting the application of blockchain technology to deal with social problems in general as well as certificate management in Vietnam.
APA, Harvard, Vancouver, ISO, and other styles
10

Sun, Liu Jie, Lei Hong Zhang, Zhen Liu, and Song Lin Zhuang. "A Technology of Printing Forgery Prevention for Certificates Based on Fingerprint Information." Advanced Materials Research 174 (December 2010): 112–17. http://dx.doi.org/10.4028/www.scientific.net/amr.174.112.

Full text
Abstract:
A new method of printing forgery prevention for certificates is proposed after researching on various algorithms of digital watermarking technology, fingerprint recognition technology, watermarking technology, encryption, and digital printing technology. The fingerprint image of the certificate owner is regarded as a watermarking and inserted in the certificate carrier. The encrypted fingerprint holographic watermarking techique is applied to increase the safty of the certificate information and realize the forgery prevention. The certificate presswork which has the encrypted fingerprint holographic watermarking information is printed by the printer. In the identification process, an ordinary scanner is employed to input certificate image information. We can use the obtained decryption keys to extract the watermark information by blind digital watermarking extracting method. The fingerprint collected on site is authorized by the extracting fingerprint information. By combining digital watermarking with fingerprint recognition technology, we realized safe authentication of user’s identity with imperceptibility of digital watermarking and the uniqueness of fingerprint recognition. This technology has some advantages. It is simple in information collecting and generating method, low in facturing cost and high in safe authentication. It has some practical application value.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Application for a certificate"

1

Krontiris, Alexandros. "Evaluation of Certificate Enrollment over Application Layer Security." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-236033.

Full text
Abstract:
This thesis analyzes Application Layer security protocols for certificate enrollment and management. EDHOC, Ephemeral Diffie-HellmanOver COSE, is a recently developed key exchange protocol whichis designed to provide authentication and key-exchange functionality with compact message sizes and minimum round-trip-time. The workof this thesis extends the EDHOC protocol with a certificate enrollment functionality, targeting IoT constrained devices and it has been implemented for analysis and evaluation purposes. The main scope of this document is to study the security, performance and scalability (in descendingorder of importance) of enrollment over EDHOC compared to other certificate enrollment protocols.
Detta examensarbete analyserar säkerhetsprotokoll av typen ApplicationLayer för certifikatregistrering och hantering. EDHOC, Ephemeral Diffie-Hellman Over COSE, har implementerats, analyserats och utvärderats. EDHOC är ett nyligen utvecklat Application Layer-protokoll som är utformat för att tillhandahålla autentiserings- och nyckelfunktionsfunktioner med kompakta meddelandestorlekar och minimala rundturstider, inriktat på IoT-begränsade enheter. Huvudområdet för examensarbetet är att studera säkerhet, prestanda och skalbarhet (i fallande ordning av betydelse) hos EDHOC jämfört med andra föreslagna Application Layer-säkerhetsprotokoll som utför certifikatsskrivning.
APA, Harvard, Vancouver, ISO, and other styles
2

Gaina, Maxim. "Blockchain and Smartcontracts: Fundamentals and a Decentralized Application Case-Study." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/15189/.

Full text
Abstract:
Questo lavoro di tesi tratta l'implementazione di un'applicazione decentralizzata in grado di certificare eventi accaduti nel mondo reale, compiuti da parte di un'organizzazione. Tali certificati devono essere (i) verificabili da chiunque, in un qualsiasi momento della storia e senza la necessità di terze parti, (ii) avere un costo di rilascio ragionevole per l'autore e (iii), avere tempi di conferma accettabili. Per poter definire meglio (a) le modalità in cui è possibile farlo, (b) l'esito del lavoro svolto ed eventuali problemi emersi, e (c) i futuri sviluppi, la tesi si prefissa i seguenti obiettivi. Verrà discusso in che modo un generico protocollo Blockchain si inserisce nell'ambito dei sistemi distribuiti. L'avvento di Bitcoin infatti, permette per la prima volta di implementare un sistema distribuito e decentralizzato, in cui è possibile avere fiducia tanto quanto necessario per eseguire transazioni finanziarie. Verranno individuate le proprietà che un protocollo deve avere per garantire sicurezza, e se possono essere raggiunte contemporaneamente. Nello stesso modo in cui i protocolli blockchain esistono "sopra" le reti peer-to-peer, verrà descritto il modo in cui gli Smartcontracts possono essere introdotti nelle blockchain. Verrà visto come questi costrutti rendono possibile l'implementazione di Applicazioni Decentralizzate (dapp). Si vedrà che tali registri distribuiti e pubblici, sono comunque in una fase di sviluppo piuttosto immatura e presentano alcuni problemi. Fra questi, quello della scalabilità all'aumentare degli utenti. Verrà visto il motivo, e il modo in cui questo problema interferisce con l'operatività della dapp realizzata.
APA, Harvard, Vancouver, ISO, and other styles
3

Abakar, Mahamat Ahmat. "Etude et mise en oeuvre d'une architecture pour l'authentification et la gestion de documents numériques certifiés : application dans le contexte des services en ligne pour le grand public." Phd thesis, Université Jean Monnet - Saint-Etienne, 2012. http://tel.archives-ouvertes.fr/tel-00975965.

Full text
Abstract:
Dans un environnement ouvert tel que l'Internet, les interlocuteurs sont parfois inconnus et toujours dématérialisés. Les concepts et les technologies de la confiance numérique et de la sécurité informatique doivent se combiner pour permettre un contrôle d'accès en environnement ouvert. Dans nos travaux, nous nous proposons d'étudier les concepts majeurs de cette problématique, puis de concevoir, et enfin de développer un système fonctionnel, basé sur des standards du contrôle d'accès, pour un environnement ouvert et appliqué à l'Internet. Plus précisément, notre étude consiste à mettre en œuvre une architecture de contrôle d'accès basée sur la confiance numérique. L'élément central de cette architecture est l'environnement utilisateur très riche et déployé en ligne. Cet environnement est doté de trois modules principaux qui permettent à l'utilisateur de mener à bien ses transactions. Ces modules sont le module d'analyse de règlements, le module de récupération de données et le module de validation de règlements. Nous avons élaborés des algorithmes utilisés dans ces modules. L'usage est le suivant. L'utilisateur demande un service à un fournisseur de services, celui-ci analyse la requête de l'utilisateur et extrait le règlement à partir de la base des règles de contrôle d'accès. Cette architecture est conçue à l'aide de modèles de contrôle d'accès basé sur les attributs et le langage XACML. Ce règlement contient des conditions à satisfaire par l'utilisateur pour obtenir le droit d'accès à la ressource demandée. Le module d'analyse de règlement permet à l'utilisateur d'analyser le règlement reçu du fournisseur de service. Cette analyse consiste à vérifier à l'aide d'un algorithme la disponibilité de ses informations auprès de ses sources d'information d'identité de confiance pour le fournisseur de services. Le module de récupération de données permet ensuite à l'utilisateur de récupérer ses certificats. Le module de validation lui permet de tester qu'il satisfait le règlement grâce aux certificats. Si le règlement est satisfait l'utilisateur diffuse ses certificats au fournisseur de service. La conception de ce système repose sur un ensemble de brique technologiques étudiées et décrites dans ces travaux. Ce document débute par une étude des différents cas d'usage dans le domaine des transactions en ligne. Cette étude permet de mettre en évidence la problématique de la gestion des identités numériques en environnement ouvert. Les organisations virtuelles, la notion de partenariat et la confiance sont des éléments clés qui entrent dans la conception des systèmes de contrôle d'accès basé sur la confiance. Une première étude d'un ensemble de modèles de contrôle d'accès nous permet de dégager le modèle ABAC et le langage XACML pour la conception de notre système. Dans un second temps, nous concevons le modèle de données de notre système de contrôle d'accès distribué et nous présentons et évaluons les algorithmes clés. Ensuite, nous concevons une architecture protocolaire satisfaisant les besoins d'interopérabilité entre les différentes entités impliquées. Il s'agit de protocoles permettant d'établir une session auprès d'un système, permettant de véhiculer un règlement de contrôle d'accès et permettant d'obtenir et de diffuser des informations entre tiers de confiance. La dernière partie est consacrée à l'implémentation réalisée en langage python et en utilisant le " framework " de développement Web Django
APA, Harvard, Vancouver, ISO, and other styles
4

Nicodeme, Marc. "Identifiabilité des signaux parcimonieux structurés et solutions algorithmiques associées : application à la reconstruction tomographique à faible nombre de vues." Thesis, Bordeaux, 2016. http://www.theses.fr/2016BORD0096/document.

Full text
Abstract:
Cette thèse étudie différents problèmes de minimisations avec des fonctions de régularisations qui promeuvent la parcimonie. Plus précisément, on souhaite reconstruire une image, que l'on suppose parcimonieuse et qui a subit une transformation après un opérateur linéaire, à l'aide de problèmes de minimisations. Dans ce manuscrit, on s'intéressera plus particulièrement à la minimisation l1 synthèse, analyse et bloc qui sont très utilisées pour reconstruction une image que l'on sait parcimonieuse. Ces minimisations produisent en pratique des résultats convaincants qui n'ont été compris théoriquement que récemment. Les différents travaux sur le sujet mettent en évidence le rôle d'un vecteur particulier appelé certificat dual. L'existence d'un certificat dual permet à la fois d'assurer la reconstruction exacte d'une image dans le cas où il n'y a pas de perturbations et d'estimer l'erreur de la reconstruction en présence de perturbations. Dans nos travaux, nous allons introduire l'existence d'un certifical dual optimal pour la minimisation l1 synthèse qui minimisent l'erreur de reconstruction. Ces résultats ayant une forte interprétation géométrique, nous avons développé un critère identifiabilité, c'est à dire que ce critère assure que l'image recherchée est l'unique solution du problème de minimisation. Ce critère permet d'étendre nos travaux à la minimisation l1 analyse, l1 bloc et à d'autres cas
This thesis studies different minimization problems with sparses based regularization. More precisely, we want to reconstruct a sparses image, which undergone a linear transformation, with minimization problems. In this manuscript, we will be focused on l1 synthesis, analysis and block minimization which are widely used in sparse approximations. These problems offer competitive results which are theorietical understood only recntly. Different studies on the subject emphasized the contribution of a particular vector called dual certificate. The existence of this dual certificate allows simultaneously to guarantee the exact recovey of an image in noiseless case and to estimate the noise robustness in noisy case. In this work, we introduce eth existence of an optimal dual certificate for the l1 synthesis minimization which minimizes the reconstruction error. As those results have a strong geometrical interpretation, we develop an identifiability criterion which ensures the uniqueness of a solution. This criterion generalizes the work on l1 synthesis minimization tothe analysis case, block case and others
APA, Harvard, Vancouver, ISO, and other styles
5

Zbierska, Katarzyna [Verfasser]. "Application and Importance of Supplementary Protection Certificates for Medicinal Products in the European Union / Katarzyna Zbierska." Aachen : Shaker, 2012. http://d-nb.info/1069050253/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Engström, Pontus. "Modernizing forms at KTH : Using Digital Signatures." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-193898.

Full text
Abstract:
Today both government agencies and companies struggle to keep up with the pace of the continuous change of technology. With all new technology there are benefits, but new problems might also occur. Implementing new technology for certain tasks may increase both efficiency and security, resulting in a more sustainable work environment. One technology that is increasingly adopted is digital signatures. Instead of using classical handwritten signatures on documents, a digital signature can be more time efficient and have higher security. In order to implement a digital signature technology some security aspects must be addressed and certain properties ensured. In the document signature process, each time an individual verifies a signature attached onto a document a log entry is created. This log contains information about who verified which document, does it have multiple parts that have been signed, does it need multiple signatures in order to be valid, and at what time and date was the document signed. Logs help to ensure the validity of the document and thereby increase the security provided by the digital signatures. At KTH, a student must sign an application form with a regular ink-written signature to start a thesis project. This process can in most cases delay the start up to two weeks. This study aims to implement digital signatures for one specific form, an application form for a thesis project. The hypothesis at the start of the project was that the use of digital signature would decrease the time of waiting significantly. Personnel at KTH using digital signature would facilitate their work efficiency, due to less printing and archiving of papers as well fewer meetings. This study will provide the reader with the necessary fundamental knowledge of cryptography and how digital signatures use this underlying technology. The methodology used in this study was to identify and modify certain software settings, as well collect data from students and personnel at KTH. The collected data was based on time measurements of digital signature processes from students and a faculty member. The results show digital signatures are faster than the current signing process with traditional ink-written signatures. Additionally, the use of digital signatures is expected to reduce the need for printing, transport, and sorting of paper documents. The resulting reduction in use of physical paper should provide environmental benefits.
Dagens myndigheter och företag har det svårt att ständigt följa den tekniska utvecklingen. Ny teknik skapar oftast nya fördelar och andra förmåner men kan ibland också orsaka problem. Att implementera ny teknik för specifika ändamål kan öka både effektivitet och säkerhet, vilket resulterar i en mer effektiv arbetsplats. En teknik som introduceras allt mer på sistone är digitala signaturer. Istället för att signera dokument med en handskriven signatur kan en digital signatur vara mer tidseffektiv och ha en högre säkerhet. För att implementera tekniken bakom digitala signaturer måste särskilda säkerhetsaspekter adresseras och specifika inställningar säkerställas. I signaturprocessen måste varje individ verifiera signaturen som är bifogad på dokumentet, denna verifiering skapar även en logg. En logg innehåller bland annat information om vem som verifierade dokumentet, om dokumentet har fler än en bifogad signatur, behöver dokumentet fler signaturer för att vara giltigt och vilken tid och datum var dokumentet signerat. En logg säkerställer validiteten av dokumentet och ökar därmed säkerheten för digitala signaturer. På KTH krävs en skriftlig ansökan för att påbörja ett examensarbete. Med nuvarande process kan det i vissa fall leda till en försenad projektstart med upp till två veckor. Den här studien syftar till att implementera digitala signaturer för ett specifikt formulär, en ansökningsblankett för att påbörja ett examensarbete. Hypotesen vid projektstart var att användning av digitala signaturer skulle kunna förminska väntetiden signifikant. Anställda på KTH som utnyttjar digitala signaturer skulle kunna förbättra deras arbetseffektivitet på grund av färre pappersutskrifter, mindre pappersarkivering och färre möten. Den här studien kommer att förse läsaren med de mest nödvändiga kunskaperna av kryptografi och hur digitala signaturer använder krypteringsfenomenet. Metodiken som användes syftade till att identifiera och modifiera specifika mjukvaruinställningar samt samla in data från studenter och personal på KTH. Den insamlade datan baserades på tidsmätningar av digitala signatursprocesser från studenter, studievägledare och handledare. Resultatet från studien visade att digitala signaturer skulle ge en snabbare signeringsprocess än nuvarande formulär. Det kan dessutom förväntas att med digitala signaturer skulle pappersutskrifter, papperstransporter och sortering av dessa dokument reduceras. Resultatet av minskad användning av fysiskt papper kommer att generera arbetsfördelar.
APA, Harvard, Vancouver, ISO, and other styles
7

Blanco, Martínez Roberto. "Applications of Foundational Proof Certificates in theorem proving." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLX111/document.

Full text
Abstract:
La confiance formelle en une propriété abstraite provient de l'existence d'une preuve de sa correction, qu'il s'agisse d'un théorème mathématique ou d'une qualité du comportement d'un logiciel ou processeur. Il existe de nombreuses définitions différentes de ce qu'est une preuve, selon par exemple qu'elle est écrite soit par des humains soit par des machines, mais ces définitions sont toutes concernées par le problème d'établir qu'un document représente en fait une preuve correcte. Le cadre des Certificats de Preuve Fondamentaux (Foundational Proof Certificates, FPC) est une approche proposée récemment pour étudier ce problème, fondée sur des progrès de la théorie de la démonstration pour définir la sémantique des formats de preuve. Les preuves ainsi définies peuvent être vérifiées indépendamment par un noyau vérificateur de confiance codé dans un langage de programmation logique. Cette thèse étend des résultats initiaux sur la certification de preuves du premier ordre en explorant plusieurs dimensions logiques essentielles, organisées en combinaisons correspondant à leur usage en pratique: d'abord, la logique classique sans points fixes, dont les preuves sont générées par des démonstrateurs automatiques de théorème; ensuite, la logique intuitionniste avec points fixes et égalité,dont les preuves sont générées par des assistants de preuve. Les certificats de preuve ne se limitent pas comme précédemment à servir de représentation des preuves complètes pour les vérifier indépendamment. Leur rôle s'étend pour englober des transformations de preuve qui peuvent enrichir ou compacter leur représentation. Ces transformations peuvent rendre des certificats plus simples opérationnellement, ce qui motive la construction d'une suite de vérificateurs de preuve de plus en plus fiables et performants. Une autre nouvelle fonction des certificats de preuve est l'écriture d'aperçus de preuve de haut niveau, qui expriment des schémas de preuve tels qu'ils sont employés dans la pratique des mathématiciens, ou dans des techniques automatiques comme le property-based testing. Ces développements s'appliquent à la certification intégrale de résultats générés par deux familles majeures de démonstrateurs automatiques de théorème, utilisant techniques de résolution et satisfaisabilité, ainsi qu'à la création de langages programmables de description de preuve pour un assistant de preuve
Formal trust in an abstract property, be it a mathematical result or a quality of the behavior of a computer program or a piece of hardware, is founded on the existence of a proof of its correctness. Many different kinds of proofs are written by mathematicians or generated by theorem provers, with the common problem of ascertaining whether those claimed proofs are themselves correct. The recently proposed Foundational Proof Certificate (FPC) framework harnesses advances in proof theory to define the semantics of proof formats, which can be verified by an independent and trusted proof checking kernel written in a logic programming language. This thesis extends initial results in certification of first-order proofs in several directions. It covers various essential logical axes grouped in meaningful combinations as they occur in practice: first,classical logic without fixed points and proofs generated by automated theorem provers; later, intuitionistic logic with fixed points and equality as logical connectives and proofs generated by proof assistants. The role of proof certificates is no longer limited to representing complete proofs to enable independent checking, but is extended to model proof transformations where details can be added to or subtracted from a certificate. These transformations yield operationally simpler certificates, around which increasingly trustworthy and performant proof checkers are constructed. Another new role of proof certificates is writing high-level proof outlines, which can be used to represent standard proof patterns as written by mathematicians, as well as automated techniques like property-based testing. We apply these developments to fully certify results produced by two families of standard automated theorem provers: resolution- and satisfiability-based. Another application is the design of programmable proof description languages for a proof assistant
APA, Harvard, Vancouver, ISO, and other styles
8

Cox, Bruce. "Applications of accuracy certificates for problems with convex structure." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/39489.

Full text
Abstract:
Applications of accuracy certificates for problems with convex structure   This dissertation addresses the efficient generation and potential applications of accuracy certificates in the framework of “black-box-represented” convex optimization problems - convex problems where the objective and the constraints are represented by  “black boxes” which, given on input a value x of the argument, somehow (perhaps in a fashion unknown to the user) provide on output the values and the derivatives of the objective and the constraints at x. The main body of the dissertation can be split into three parts.  In the first part, we provide our background --- state of the art of the theory of accuracy certificates for black-box-represented convex optimization. In the second part, we extend the toolbox of black-box-oriented convex optimization algorithms with accuracy certificates by equipping with these certificates a state-of-the-art algorithm for large-scale nonsmooth black-box-represented problems with convex structure, specifically, the Non-Euclidean Restricted Memory Level (NERML) method. In the third part, we present several novel academic applications of accuracy certificates. The dissertation is organized as follows: In Chapter 1, we motivate our research goals and present a detailed summary of our results. In Chapter 2, we outline the relevant background, specifically, describe four generic black-box-represented generic problems with convex structure (Convex Minimization, Convex-Concave Saddle Point, Convex Nash Equilibrium, and Variational Inequality with Monotone Operator), and outline the existing theory of accuracy certificates for these problems. In Chapter 3, we develop techniques for equipping with on-line accuracy certificates the state-of-the-art NERML algorithm for large-scale nonsmooth problems with convex structure, both in the cases when the domain of the problem is a simple solid and in the case when the domain is given by Separation oracle. In Chapter 4, we develop  several novel academic applications of accuracy certificates, primarily to (a) efficient certifying emptiness of the intersection of finitely many solids given by Separation oracles, and (b) building efficient algorithms for convex minimization over solids given by Linear Optimization oracles (both precise and approximate). In Chapter 5, we apply accuracy certificates to efficient decomposition of “well structured” convex-concave saddle point problems, with applications to computationally attractive decomposition of a large-scale LP program with the constraint matrix which becomes block-diagonal after eliminating a relatively small number of possibly dense columns (corresponding to “linking variables”) and possibly dense rows (corresponding to “linking constraints”).
APA, Harvard, Vancouver, ISO, and other styles
9

Soják, Zbyněk. "Certifikační postupy pro experimentální letouny." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2008. http://www.nusl.cz/ntk/nusl-228076.

Full text
Abstract:
Work includes certification procedures for experimental aeroplanes. Producer must answer individual work for right procedure certification. Office UCL give works and control production procedure aeroplane. Stationery (applications, confirmation, tec.) are part of work and is need make and feed. Part of work is VUT 001 MARABU and technical characteristics aeroplane.
APA, Harvard, Vancouver, ISO, and other styles
10

Hagström, Åsa. "Understanding Certificate Revocation." Licentiate thesis, Linköping University, Linköping University, Department of Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-5477.

Full text
Abstract:

Correct certificate revocation practices are essential to each public-key infrastructure. While there exist a number of protocols to achieve revocation in PKI systems, there has been very little work on the theory behind it: Which different types of revocation can be identified? What is the intended effect of a specific revocation type to the knowledge base of each entity?

As a first step towards a methodology for the development of reliable models, we present a graph-based formalism for specification and reasoning about the distribution and revocation of public keys and certificates. The model is an abstract generalization of existing PKIs and distributed in nature; each entity can issue certificates for public keys that they have confidence in, and distribute or revoke these to and from other entities.

Each entity has its own public-key base and can derive new knowledge by combining this knowledge with certificates signed with known keys. Each statement that is deduced or quoted within the system derives its support from original knowledge formed outside the system. When such original knowledge is removed, all statements that depended upon it are removed as well. Cyclic support is avoided through the use of support sets.

We define different revocation reasons and show how they can be modelled as specific actions. Revocation by removal, by inactivation, and by negation are all included. By policy, negative statements are the strongest, and positive are the weakest. Collisions are avoided by removing the weaker statement and, when necessary, its support.

Graph transformation rules are the chosen formalism. Rules are either interactive changes that can be applied by entities, or automatically applied deductions that keep the system sound and complete after the application of an interactive rule.

We show that the proposed model is sound and complete with respect to our definition of a valid state.


Report code: LIU-TEK-LIC-2006:1
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Application for a certificate"

1

ADMINISTRATION, FEDERAL AVIATION. Application guide for obtaining a supplemental type certificate. Washington, DC: U.S. Dept. of Transportation, Federal Aviation Administration, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Company, Algonquin Gas Transmission. Application for a certificate of public convenience and necessity: FERC Section 7(c) application : J-2 Loop Project. [Washington, D.C: Federal Energy Regulatory Commission], 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

), National Cancer Institute (U S. Certificates of confidentiality: Background information and application procedures. [Bethesda, Md.]: The Institute, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brennan, Ann. The application of information and communication technology in the Leaving Certificate applied programme: A case study of curriculum innovation and classroom integration. [S.l: The Author], 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Suyc, Viktor, and Mariya Vahrushina. International Financial Reporting and Auditing Standards. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1096411.

Full text
Abstract:
The textbook is the basis for a number of courses taught at the Faculty of Economics of the Lomonosov Moscow State University and at the Financial University under the Government of the Russian Federation. The textbook reflects the main requirements of international standards for both financial reporting and auditing. Meets the requirements of the federal state educational standards of higher education of the latest generation. It is intended for undergraduates and postgraduates studying the disciplines "International Audit", "Practice of external and internal audit", "International Financial Reporting Standards", "International Financial Reporting Standards: advanced course", "Consolidated reporting: practice of application", "Corporate reporting: Practice of application". It can be used when teaching the course "Audit" in the bachelor's degree, as well as by students of the postgraduate education system who apply for the auditor's qualification certificate and the accountant's qualification certificate, since it meets all the relevant requirements. It will be useful for practical workers — auditors, accountants, financial managers, business leaders, financial consultants and experts.
APA, Harvard, Vancouver, ISO, and other styles
6

Office, General Accounting. Federal banking agencies are adequately examining net worth certificate program applications: Report to the Congress. [Washington, D.C.]: General Accounting Office, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Office, General Accounting. Federal banking agencies are adequately examining net worth certificate program applications: Report to the Congress. [Washington, D.C.]: General Accounting Office, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

ADMINISTRATION, FEDERAL AVIATION. Guidelines for airworthiness approval of airborne data link systems and applications. Washington, D.C: U.S. Dept. of Transportation, Federal Aviation Administration, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

FEDERAL AVIATION ADMINISTRATION. Guidelines for airworthiness approval of airborne data link systems and applications. Washington, D.C: U.S. Dept. of Transportation, Federal Aviation Administration, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Huddersfield, Polytechnic. Application to the Business and Technician Education Council for re-approval of courses leading to BTEC Higher National Diploma, BTEC Higher National Certificate in Business and Finance: Course details. [Huddersfield]: The Polytechnic, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Application for a certificate"

1

Mukkamala, Ravi, and Sushil Jajodia. "A Novel Approach to Certificate Revocation Management." In Database and Application Security XV, 225–38. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35587-0_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Niemetz, Aina, Mathias Preiner, Florian Lonsing, Martina Seidl, and Armin Biere. "Resolution-Based Certificate Extraction for QBF." In Theory and Applications of Satisfiability Testing – SAT 2012, 430–35. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31612-8_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chaturvedi, Anubha, and Brijesh Kumar Chaurasia. "Certificate Revocation in Hybrid Ad Hoc Network." In Data, Engineering and Applications, 85–91. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6351-1_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shaohui, Wang, and Chang Suqin. "Construction of Lightweight Certificate-Based Signature and Application in Cloud Computing." In Communications in Computer and Information Science, 61–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54522-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ravi Kishore, K., G. Jyostna, Mahesh U. Patil, P. R. Lakshmi Eswari, and E. Magesh. "Blockchain Based Proof of Existence (PoE) Application for Educational Certificate Verification." In Communication Software and Networks, 575–86. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5397-4_58.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ambainis, Andris, Krišjānis Prūsis, and Jevgēnijs Vihrovs. "Sensitivity Versus Certificate Complexity of Boolean Functions." In Computer Science – Theory and Applications, 16–28. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-34171-2_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Weaver, Gabriel A., Scott Rea, and Sean W. Smith. "A Computational Framework for Certificate Policy Operations." In Public Key Infrastructures, Services and Applications, 17–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16441-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kim, Tiffany Hyun-Jin, Virgil Gligor, and Adrian Perrig. "GeoPKI: Converting Spatial Trust into Certificate Trust." In Public Key Infrastructures, Services and Applications, 128–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40012-4_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kumutha, K., and S. Jayalakshmi. "Blockchain Technology and Academic Certificate Authenticity—A Review." In Expert Clouds and Applications, 321–34. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2126-0_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bhaskar, Umang, and Gunjan Kumar. "A Non-Extendibility Certificate for Submodularity and Applications." In Lecture Notes in Computer Science, 603–14. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58150-3_49.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Application for a certificate"

1

Yihong Long, Zhihong Tang, and Xu Liu. "Application-oriented cross-CA certificate trust." In 2010 IEEE International Conference on Information Theory and Information Security (ICITIS). IEEE, 2010. http://dx.doi.org/10.1109/icitis.2010.5689480.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Aslam, Baber, and Cliff Zou. "Distributed certificate and application architecture for VANETs." In MILCOM 2009 - 2009 IEEE Military Communications Conference. IEEE, 2009. http://dx.doi.org/10.1109/milcom.2009.5379867.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jin Liu, Hui Li, Guo Sheng Xu, and Chen Chen. "Application of transitive signature to cross-certificate." In 2010 International Conference on Advanced Intelligence and Awareness Internet (AIAI 2010). IET, 2010. http://dx.doi.org/10.1049/cp.2010.0787.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, Jong-Hyuk, Hee-Bong Choi, and Jae-Cheol Ryou. "Countermeasures to Vulnerability of Certificate Application in u-City." In Applications (CUTE). IEEE, 2010. http://dx.doi.org/10.1109/icut.2010.5677755.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bhor, Mahesh, and Deepak Karia. "Certificate pinning for android applications." In 2017 International Conference on Inventive Systems and Control (ICISC). IEEE, 2017. http://dx.doi.org/10.1109/icisc.2017.8068748.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hu, Chaoju, and Na Xu. "Application of XTR Public Key System in Certificate Authority System." In 2008 International Conference on Computer Science and Software Engineering. IEEE, 2008. http://dx.doi.org/10.1109/csse.2008.355.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Fengwei, Huan Zhang, Na Liu, and Yue Wang. "Research and Application of Certificate Management System with Floating Window." In 2017 5th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2017). Paris, France: Atlantis Press, 2017. http://dx.doi.org/10.2991/icmmct-17.2017.143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Hao, and Hideaki Goto. "Certificate-Based, Disruption-Tolerant Authentication System with Automatic CA Certificate Distribution for Eduroam." In 2014 IEEE 38th International Computer Software and Applications Conference Workshops (COMPSACW). IEEE, 2014. http://dx.doi.org/10.1109/compsacw.2014.32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Liang, Huaqing, Hongdong Yin, and Xinxin Niu. "A Robust Digital Watermarking Scheme and Its Application in Certificate Verification." In 2009 International Conference on Measuring Technology and Mechatronics Automation. IEEE, 2009. http://dx.doi.org/10.1109/icmtma.2009.295.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Poorni, R., M. Lakshmanan, and S. Bhuvaneswari. "DIGICERT: A Secured Digital Certificate Application using Blockchain through Smart Contracts." In 2019 International Conference on Communication and Electronics Systems (ICCES). IEEE, 2019. http://dx.doi.org/10.1109/icces45898.2019.9002576.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Application for a certificate"

1

Shoemaker, R. B. Automated Certificate Management Environment (ACME) TLS Application‑Layer Protocol Negotiation (ALPN) Challenge Extension. RFC Editor, February 2020. http://dx.doi.org/10.17487/rfc8737.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Housley, R. The application/pkix-attr-cert Media Type for Attribute Certificates. RFC Editor, May 2010. http://dx.doi.org/10.17487/rfc5877.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Laurie, B., A. Langley, and E. Kasper. Certificate Transparency. RFC Editor, June 2013. http://dx.doi.org/10.17487/rfc6962.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Solinas, J., and L. Zieglar. Suite B Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, January 2010. http://dx.doi.org/10.17487/rfc5759.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Park, S., H. Park, Y. Won, J. Lee, and S. Kent. Traceable Anonymous Certificate. RFC Editor, August 2009. http://dx.doi.org/10.17487/rfc5636.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ellison, C., B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI Certificate Theory. RFC Editor, September 1999. http://dx.doi.org/10.17487/rfc2693.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ghedini, A., and V. Vasiliev. TLS Certificate Compression. RFC Editor, December 2020. http://dx.doi.org/10.17487/rfc8879.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gagliano, R., S. Krishnan, and A. Kukec. Certificate Profile and Certificate Management for SEcure Neighbor Discovery (SEND). RFC Editor, February 2012. http://dx.doi.org/10.17487/rfc6494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Andersen, Gwendolyn S. Renewable Energy Certificate Program. Office of Scientific and Technical Information (OSTI), July 2012. http://dx.doi.org/10.2172/1045947.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Weis, B., R. Gagliano, and K. Patel. BGPsec Router Certificate Rollover. RFC Editor, August 2019. http://dx.doi.org/10.17487/rfc8634.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography