Academic literature on the topic 'Application for a certificate'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Application for a certificate.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Application for a certificate"
Mardianto, Is, and Kuswandi Kuswandi. "Implementasi Keamanan pada Transaksi Data Menggunakan Sertifikat Digital X.509." Jurnal ULTIMATICS 8, no. 1 (March 20, 2017): 1–10. http://dx.doi.org/10.31937/ti.v8i1.496.
Full textSamala, Agariadne Dwinggo, and Bayu Ramadhani Fajri. "RANCANG BANGUN APLIKASI E-SERTIFIKAT BERBASIS WEB MENGGUNAKAN METODE PENGEMBANGAN WATERFALL." JURNAL TEKNIK INFORMATIKA 13, no. 2 (February 15, 2021): 147–56. http://dx.doi.org/10.15408/jti.v13i2.16470.
Full textMashendra, Mashendra, and Deddy Mursanto. "Juridical Review of The Application of Digital Mapping (Plotting) of Land Ownership Rights in The Prevention of Multiple Certificates." Jurnal Hukum Volkgeist 5, no. 2 (June 24, 2021): 185–93. http://dx.doi.org/10.35326/volkgeist.v5i2.1081.
Full textSugiharto, Tito, and Mohammad Irwansyah. "Inovasi Pengembangan Sistem Informasi Pengelolaan Surat Keterangan Pendamping Ijazah Berbasis Web." JURNAL MEDIA INFORMATIKA BUDIDARMA 4, no. 2 (April 25, 2020): 325. http://dx.doi.org/10.30865/mib.v4i2.1903.
Full textLamont, Scott, Scott Brunero, and Swapnil Sharma. "Application and implications of Mental Health Act 2007 (NSW) certificate use in acute generalist settings." Australian Health Review 40, no. 2 (2016): 219. http://dx.doi.org/10.1071/ah15045.
Full textChien, Hung-Yu. "Dynamic Public Key Certificates with Forward Secrecy." Electronics 10, no. 16 (August 19, 2021): 2009. http://dx.doi.org/10.3390/electronics10162009.
Full textAgustin, Farida, Qurotul Aini, Alfiah Khoirunisa, and Efa Ayu Nabila. "Utilization of Blockchain Technology for Management E-Certificate Open Journal System." Aptisi Transactions on Management (ATM) 4, no. 2 (April 18, 2020): 134–39. http://dx.doi.org/10.33050/atm.v4i2.1293.
Full textVimpari, Jussi, and Seppo Junnila. "Valuing green building certificates as real options." Journal of European Real Estate Research 7, no. 2 (July 29, 2014): 181–98. http://dx.doi.org/10.1108/jerer-06-2013-0012.
Full textNguyen, Binh Minh, Thanh-Chung Dao, and Ba-Lam Do. "Towards a blockchain-based certificate authentication system in Vietnam." PeerJ Computer Science 6 (March 30, 2020): e266. http://dx.doi.org/10.7717/peerj-cs.266.
Full textSun, Liu Jie, Lei Hong Zhang, Zhen Liu, and Song Lin Zhuang. "A Technology of Printing Forgery Prevention for Certificates Based on Fingerprint Information." Advanced Materials Research 174 (December 2010): 112–17. http://dx.doi.org/10.4028/www.scientific.net/amr.174.112.
Full textDissertations / Theses on the topic "Application for a certificate"
Krontiris, Alexandros. "Evaluation of Certificate Enrollment over Application Layer Security." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-236033.
Full textDetta examensarbete analyserar säkerhetsprotokoll av typen ApplicationLayer för certifikatregistrering och hantering. EDHOC, Ephemeral Diffie-Hellman Over COSE, har implementerats, analyserats och utvärderats. EDHOC är ett nyligen utvecklat Application Layer-protokoll som är utformat för att tillhandahålla autentiserings- och nyckelfunktionsfunktioner med kompakta meddelandestorlekar och minimala rundturstider, inriktat på IoT-begränsade enheter. Huvudområdet för examensarbetet är att studera säkerhet, prestanda och skalbarhet (i fallande ordning av betydelse) hos EDHOC jämfört med andra föreslagna Application Layer-säkerhetsprotokoll som utför certifikatsskrivning.
Gaina, Maxim. "Blockchain and Smartcontracts: Fundamentals and a Decentralized Application Case-Study." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/15189/.
Full textAbakar, Mahamat Ahmat. "Etude et mise en oeuvre d'une architecture pour l'authentification et la gestion de documents numériques certifiés : application dans le contexte des services en ligne pour le grand public." Phd thesis, Université Jean Monnet - Saint-Etienne, 2012. http://tel.archives-ouvertes.fr/tel-00975965.
Full textNicodeme, Marc. "Identifiabilité des signaux parcimonieux structurés et solutions algorithmiques associées : application à la reconstruction tomographique à faible nombre de vues." Thesis, Bordeaux, 2016. http://www.theses.fr/2016BORD0096/document.
Full textThis thesis studies different minimization problems with sparses based regularization. More precisely, we want to reconstruct a sparses image, which undergone a linear transformation, with minimization problems. In this manuscript, we will be focused on l1 synthesis, analysis and block minimization which are widely used in sparse approximations. These problems offer competitive results which are theorietical understood only recntly. Different studies on the subject emphasized the contribution of a particular vector called dual certificate. The existence of this dual certificate allows simultaneously to guarantee the exact recovey of an image in noiseless case and to estimate the noise robustness in noisy case. In this work, we introduce eth existence of an optimal dual certificate for the l1 synthesis minimization which minimizes the reconstruction error. As those results have a strong geometrical interpretation, we develop an identifiability criterion which ensures the uniqueness of a solution. This criterion generalizes the work on l1 synthesis minimization tothe analysis case, block case and others
Zbierska, Katarzyna [Verfasser]. "Application and Importance of Supplementary Protection Certificates for Medicinal Products in the European Union / Katarzyna Zbierska." Aachen : Shaker, 2012. http://d-nb.info/1069050253/34.
Full textEngström, Pontus. "Modernizing forms at KTH : Using Digital Signatures." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-193898.
Full textDagens myndigheter och företag har det svårt att ständigt följa den tekniska utvecklingen. Ny teknik skapar oftast nya fördelar och andra förmåner men kan ibland också orsaka problem. Att implementera ny teknik för specifika ändamål kan öka både effektivitet och säkerhet, vilket resulterar i en mer effektiv arbetsplats. En teknik som introduceras allt mer på sistone är digitala signaturer. Istället för att signera dokument med en handskriven signatur kan en digital signatur vara mer tidseffektiv och ha en högre säkerhet. För att implementera tekniken bakom digitala signaturer måste särskilda säkerhetsaspekter adresseras och specifika inställningar säkerställas. I signaturprocessen måste varje individ verifiera signaturen som är bifogad på dokumentet, denna verifiering skapar även en logg. En logg innehåller bland annat information om vem som verifierade dokumentet, om dokumentet har fler än en bifogad signatur, behöver dokumentet fler signaturer för att vara giltigt och vilken tid och datum var dokumentet signerat. En logg säkerställer validiteten av dokumentet och ökar därmed säkerheten för digitala signaturer. På KTH krävs en skriftlig ansökan för att påbörja ett examensarbete. Med nuvarande process kan det i vissa fall leda till en försenad projektstart med upp till två veckor. Den här studien syftar till att implementera digitala signaturer för ett specifikt formulär, en ansökningsblankett för att påbörja ett examensarbete. Hypotesen vid projektstart var att användning av digitala signaturer skulle kunna förminska väntetiden signifikant. Anställda på KTH som utnyttjar digitala signaturer skulle kunna förbättra deras arbetseffektivitet på grund av färre pappersutskrifter, mindre pappersarkivering och färre möten. Den här studien kommer att förse läsaren med de mest nödvändiga kunskaperna av kryptografi och hur digitala signaturer använder krypteringsfenomenet. Metodiken som användes syftade till att identifiera och modifiera specifika mjukvaruinställningar samt samla in data från studenter och personal på KTH. Den insamlade datan baserades på tidsmätningar av digitala signatursprocesser från studenter, studievägledare och handledare. Resultatet från studien visade att digitala signaturer skulle ge en snabbare signeringsprocess än nuvarande formulär. Det kan dessutom förväntas att med digitala signaturer skulle pappersutskrifter, papperstransporter och sortering av dessa dokument reduceras. Resultatet av minskad användning av fysiskt papper kommer att generera arbetsfördelar.
Blanco, Martínez Roberto. "Applications of Foundational Proof Certificates in theorem proving." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLX111/document.
Full textFormal trust in an abstract property, be it a mathematical result or a quality of the behavior of a computer program or a piece of hardware, is founded on the existence of a proof of its correctness. Many different kinds of proofs are written by mathematicians or generated by theorem provers, with the common problem of ascertaining whether those claimed proofs are themselves correct. The recently proposed Foundational Proof Certificate (FPC) framework harnesses advances in proof theory to define the semantics of proof formats, which can be verified by an independent and trusted proof checking kernel written in a logic programming language. This thesis extends initial results in certification of first-order proofs in several directions. It covers various essential logical axes grouped in meaningful combinations as they occur in practice: first,classical logic without fixed points and proofs generated by automated theorem provers; later, intuitionistic logic with fixed points and equality as logical connectives and proofs generated by proof assistants. The role of proof certificates is no longer limited to representing complete proofs to enable independent checking, but is extended to model proof transformations where details can be added to or subtracted from a certificate. These transformations yield operationally simpler certificates, around which increasingly trustworthy and performant proof checkers are constructed. Another new role of proof certificates is writing high-level proof outlines, which can be used to represent standard proof patterns as written by mathematicians, as well as automated techniques like property-based testing. We apply these developments to fully certify results produced by two families of standard automated theorem provers: resolution- and satisfiability-based. Another application is the design of programmable proof description languages for a proof assistant
Cox, Bruce. "Applications of accuracy certificates for problems with convex structure." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/39489.
Full textSoják, Zbyněk. "Certifikační postupy pro experimentální letouny." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2008. http://www.nusl.cz/ntk/nusl-228076.
Full textHagström, Åsa. "Understanding Certificate Revocation." Licentiate thesis, Linköping University, Linköping University, Department of Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-5477.
Full textCorrect certificate revocation practices are essential to each public-key infrastructure. While there exist a number of protocols to achieve revocation in PKI systems, there has been very little work on the theory behind it: Which different types of revocation can be identified? What is the intended effect of a specific revocation type to the knowledge base of each entity?
As a first step towards a methodology for the development of reliable models, we present a graph-based formalism for specification and reasoning about the distribution and revocation of public keys and certificates. The model is an abstract generalization of existing PKIs and distributed in nature; each entity can issue certificates for public keys that they have confidence in, and distribute or revoke these to and from other entities.
Each entity has its own public-key base and can derive new knowledge by combining this knowledge with certificates signed with known keys. Each statement that is deduced or quoted within the system derives its support from original knowledge formed outside the system. When such original knowledge is removed, all statements that depended upon it are removed as well. Cyclic support is avoided through the use of support sets.
We define different revocation reasons and show how they can be modelled as specific actions. Revocation by removal, by inactivation, and by negation are all included. By policy, negative statements are the strongest, and positive are the weakest. Collisions are avoided by removing the weaker statement and, when necessary, its support.
Graph transformation rules are the chosen formalism. Rules are either interactive changes that can be applied by entities, or automatically applied deductions that keep the system sound and complete after the application of an interactive rule.
We show that the proposed model is sound and complete with respect to our definition of a valid state.
Report code: LIU-TEK-LIC-2006:1
Books on the topic "Application for a certificate"
ADMINISTRATION, FEDERAL AVIATION. Application guide for obtaining a supplemental type certificate. Washington, DC: U.S. Dept. of Transportation, Federal Aviation Administration, 1998.
Find full textCompany, Algonquin Gas Transmission. Application for a certificate of public convenience and necessity: FERC Section 7(c) application : J-2 Loop Project. [Washington, D.C: Federal Energy Regulatory Commission], 2008.
Find full text), National Cancer Institute (U S. Certificates of confidentiality: Background information and application procedures. [Bethesda, Md.]: The Institute, 1998.
Find full textBrennan, Ann. The application of information and communication technology in the Leaving Certificate applied programme: A case study of curriculum innovation and classroom integration. [S.l: The Author], 2004.
Find full textSuyc, Viktor, and Mariya Vahrushina. International Financial Reporting and Auditing Standards. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1096411.
Full textOffice, General Accounting. Federal banking agencies are adequately examining net worth certificate program applications: Report to the Congress. [Washington, D.C.]: General Accounting Office, 1985.
Find full textOffice, General Accounting. Federal banking agencies are adequately examining net worth certificate program applications: Report to the Congress. [Washington, D.C.]: General Accounting Office, 1985.
Find full textADMINISTRATION, FEDERAL AVIATION. Guidelines for airworthiness approval of airborne data link systems and applications. Washington, D.C: U.S. Dept. of Transportation, Federal Aviation Administration, 1994.
Find full textFEDERAL AVIATION ADMINISTRATION. Guidelines for airworthiness approval of airborne data link systems and applications. Washington, D.C: U.S. Dept. of Transportation, Federal Aviation Administration, 1994.
Find full textHuddersfield, Polytechnic. Application to the Business and Technician Education Council for re-approval of courses leading to BTEC Higher National Diploma, BTEC Higher National Certificate in Business and Finance: Course details. [Huddersfield]: The Polytechnic, 1986.
Find full textBook chapters on the topic "Application for a certificate"
Mukkamala, Ravi, and Sushil Jajodia. "A Novel Approach to Certificate Revocation Management." In Database and Application Security XV, 225–38. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35587-0_16.
Full textNiemetz, Aina, Mathias Preiner, Florian Lonsing, Martina Seidl, and Armin Biere. "Resolution-Based Certificate Extraction for QBF." In Theory and Applications of Satisfiability Testing – SAT 2012, 430–35. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31612-8_33.
Full textChaturvedi, Anubha, and Brijesh Kumar Chaurasia. "Certificate Revocation in Hybrid Ad Hoc Network." In Data, Engineering and Applications, 85–91. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6351-1_8.
Full textShaohui, Wang, and Chang Suqin. "Construction of Lightweight Certificate-Based Signature and Application in Cloud Computing." In Communications in Computer and Information Science, 61–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54522-1_7.
Full textRavi Kishore, K., G. Jyostna, Mahesh U. Patil, P. R. Lakshmi Eswari, and E. Magesh. "Blockchain Based Proof of Existence (PoE) Application for Educational Certificate Verification." In Communication Software and Networks, 575–86. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5397-4_58.
Full textAmbainis, Andris, Krišjānis Prūsis, and Jevgēnijs Vihrovs. "Sensitivity Versus Certificate Complexity of Boolean Functions." In Computer Science – Theory and Applications, 16–28. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-34171-2_2.
Full textWeaver, Gabriel A., Scott Rea, and Sean W. Smith. "A Computational Framework for Certificate Policy Operations." In Public Key Infrastructures, Services and Applications, 17–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16441-5_2.
Full textKim, Tiffany Hyun-Jin, Virgil Gligor, and Adrian Perrig. "GeoPKI: Converting Spatial Trust into Certificate Trust." In Public Key Infrastructures, Services and Applications, 128–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40012-4_9.
Full textKumutha, K., and S. Jayalakshmi. "Blockchain Technology and Academic Certificate Authenticity—A Review." In Expert Clouds and Applications, 321–34. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2126-0_28.
Full textBhaskar, Umang, and Gunjan Kumar. "A Non-Extendibility Certificate for Submodularity and Applications." In Lecture Notes in Computer Science, 603–14. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58150-3_49.
Full textConference papers on the topic "Application for a certificate"
Yihong Long, Zhihong Tang, and Xu Liu. "Application-oriented cross-CA certificate trust." In 2010 IEEE International Conference on Information Theory and Information Security (ICITIS). IEEE, 2010. http://dx.doi.org/10.1109/icitis.2010.5689480.
Full textAslam, Baber, and Cliff Zou. "Distributed certificate and application architecture for VANETs." In MILCOM 2009 - 2009 IEEE Military Communications Conference. IEEE, 2009. http://dx.doi.org/10.1109/milcom.2009.5379867.
Full textJin Liu, Hui Li, Guo Sheng Xu, and Chen Chen. "Application of transitive signature to cross-certificate." In 2010 International Conference on Advanced Intelligence and Awareness Internet (AIAI 2010). IET, 2010. http://dx.doi.org/10.1049/cp.2010.0787.
Full textKim, Jong-Hyuk, Hee-Bong Choi, and Jae-Cheol Ryou. "Countermeasures to Vulnerability of Certificate Application in u-City." In Applications (CUTE). IEEE, 2010. http://dx.doi.org/10.1109/icut.2010.5677755.
Full textBhor, Mahesh, and Deepak Karia. "Certificate pinning for android applications." In 2017 International Conference on Inventive Systems and Control (ICISC). IEEE, 2017. http://dx.doi.org/10.1109/icisc.2017.8068748.
Full textHu, Chaoju, and Na Xu. "Application of XTR Public Key System in Certificate Authority System." In 2008 International Conference on Computer Science and Software Engineering. IEEE, 2008. http://dx.doi.org/10.1109/csse.2008.355.
Full textWang, Fengwei, Huan Zhang, Na Liu, and Yue Wang. "Research and Application of Certificate Management System with Floating Window." In 2017 5th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2017). Paris, France: Atlantis Press, 2017. http://dx.doi.org/10.2991/icmmct-17.2017.143.
Full textLiu, Hao, and Hideaki Goto. "Certificate-Based, Disruption-Tolerant Authentication System with Automatic CA Certificate Distribution for Eduroam." In 2014 IEEE 38th International Computer Software and Applications Conference Workshops (COMPSACW). IEEE, 2014. http://dx.doi.org/10.1109/compsacw.2014.32.
Full textLiang, Huaqing, Hongdong Yin, and Xinxin Niu. "A Robust Digital Watermarking Scheme and Its Application in Certificate Verification." In 2009 International Conference on Measuring Technology and Mechatronics Automation. IEEE, 2009. http://dx.doi.org/10.1109/icmtma.2009.295.
Full textPoorni, R., M. Lakshmanan, and S. Bhuvaneswari. "DIGICERT: A Secured Digital Certificate Application using Blockchain through Smart Contracts." In 2019 International Conference on Communication and Electronics Systems (ICCES). IEEE, 2019. http://dx.doi.org/10.1109/icces45898.2019.9002576.
Full textReports on the topic "Application for a certificate"
Shoemaker, R. B. Automated Certificate Management Environment (ACME) TLS Application‑Layer Protocol Negotiation (ALPN) Challenge Extension. RFC Editor, February 2020. http://dx.doi.org/10.17487/rfc8737.
Full textHousley, R. The application/pkix-attr-cert Media Type for Attribute Certificates. RFC Editor, May 2010. http://dx.doi.org/10.17487/rfc5877.
Full textLaurie, B., A. Langley, and E. Kasper. Certificate Transparency. RFC Editor, June 2013. http://dx.doi.org/10.17487/rfc6962.
Full textSolinas, J., and L. Zieglar. Suite B Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, January 2010. http://dx.doi.org/10.17487/rfc5759.
Full textPark, S., H. Park, Y. Won, J. Lee, and S. Kent. Traceable Anonymous Certificate. RFC Editor, August 2009. http://dx.doi.org/10.17487/rfc5636.
Full textEllison, C., B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI Certificate Theory. RFC Editor, September 1999. http://dx.doi.org/10.17487/rfc2693.
Full textGhedini, A., and V. Vasiliev. TLS Certificate Compression. RFC Editor, December 2020. http://dx.doi.org/10.17487/rfc8879.
Full textGagliano, R., S. Krishnan, and A. Kukec. Certificate Profile and Certificate Management for SEcure Neighbor Discovery (SEND). RFC Editor, February 2012. http://dx.doi.org/10.17487/rfc6494.
Full textAndersen, Gwendolyn S. Renewable Energy Certificate Program. Office of Scientific and Technical Information (OSTI), July 2012. http://dx.doi.org/10.2172/1045947.
Full textWeis, B., R. Gagliano, and K. Patel. BGPsec Router Certificate Rollover. RFC Editor, August 2019. http://dx.doi.org/10.17487/rfc8634.
Full text