Journal articles on the topic 'Client certificate'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Client certificate.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Foppe, Lucas, Jeremy Martin, Travis Mayberry, Erik C. Rye, and Lamont Brown. "Exploiting TLS Client Authentication for Widespread User Tracking." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (2018): 51–63. http://dx.doi.org/10.1515/popets-2018-0031.
Full textAhamad, Shaik Shakeel, V. N. Sastry, and Siba K. Udgata. "Secure and Optimized Mobile Based Merchant Payment Protocol using Signcryption." International Journal of Information Security and Privacy 6, no. 2 (2012): 64–94. http://dx.doi.org/10.4018/jisp.2012040105.
Full textMardianto, Is, and Kuswandi Kuswandi. "Implementasi Keamanan pada Transaksi Data Menggunakan Sertifikat Digital X.509." Jurnal ULTIMATICS 8, no. 1 (2017): 1–10. http://dx.doi.org/10.31937/ti.v8i1.496.
Full textBoyen, Xavier, Udyani Herath, Matthew McKague, and Douglas Stebila. "Associative Blockchain for Decentralized PKI Transparency." Cryptography 5, no. 2 (2021): 14. http://dx.doi.org/10.3390/cryptography5020014.
Full textAlnatsheh, Essam. "The Efficient Use of a List of Trusted Certificate Authorities." International Journal of Engineering Technology and Sciences 5, no. 3 (2018): 118–31. http://dx.doi.org/10.15282/ijets.v5i3.1135.
Full textSebastian, S., and R. S. Chouhan. "Privacy Preservation and Data Security on Internet Using Mutual Ssl." Oriental journal of computer science and technology 10, no. 1 (2017): 249–54. http://dx.doi.org/10.13005/ojcst/10.01.34.
Full textBudi P, Ignasius Irawan. "Wireless access point protection from un-authorized user in an office environment." ACMIT Proceedings 1, no. 1 (2019): 90–98. http://dx.doi.org/10.33555/acmit.v1i1.11.
Full textLapshichyov, Vitaly V. "TLS Certificates of the Tor Network and Their Distinctive Features." International Journal of Systems and Software Security and Protection 10, no. 2 (2019): 20–43. http://dx.doi.org/10.4018/ijsssp.2019070102.
Full textWibisurya, Aswin, and Timothy Yudi Adinugroho. "A Reusable Software Copy Protection Using Hash Result and Asymetrical Encryption." ComTech: Computer, Mathematics and Engineering Applications 5, no. 2 (2014): 647. http://dx.doi.org/10.21512/comtech.v5i2.2215.
Full textMohamad, Imad, and Aws Abdulsahib. "A Framework Prototype for E-Authentication of Iraqi Civil-Identity Certificate." Iraqi Journal for Computers and Informatics 41, no. 1 (2014): 20–25. http://dx.doi.org/10.25195/ijci.v41i1.93.
Full textKohlar, Florian, Jörg Schwenk, Meiko Jensen, and Sebastian Gajek. "On Cryptographically Strong Bindings of SAML Assertions to Transport Layer Security." International Journal of Mobile Computing and Multimedia Communications 3, no. 4 (2011): 20–35. http://dx.doi.org/10.4018/jmcmc.2011100102.
Full textSeniman, Seniman, Baihaqi Siregar, Rani Masyithah Pelle, and Fahmi Fahmi. "Securing sensor data transmission with ethernet elliptic curve cryptography secure socket layer on STM32F103 device." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (2021): 507. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp507-515.
Full textWei, Min, Shuaidong Zhang, Ping Wang, and Keecheon Kim. "An authentication and key agreement mechanism for OPC Unified Architecture in industrial Internet of Things." International Journal of Distributed Sensor Networks 14, no. 1 (2018): 155014771875479. http://dx.doi.org/10.1177/1550147718754793.
Full textKumar, Neeraj. "Load Balancing Aware Multiparty Secure Group Communication for Online Services in Wireless Mesh Networks." International Journal of Wireless Networks and Broadband Technologies 1, no. 3 (2011): 15–29. http://dx.doi.org/10.4018/ijwnbt.2011070102.
Full textStasiak-Betlejewska, Renata, and Eva Nedeliaková. "Determinants of the Energy Saving Construction Quality in the Green Design." Quality Production Improvement - QPI 1, no. 1 (2019): 178–83. http://dx.doi.org/10.2478/cqpi-2019-0024.
Full textSiau, Keng. "Xcert Software, Inc." Journal of Information Technology 14, no. 3 (1999): 235–42. http://dx.doi.org/10.1177/026839629901400303.
Full textFigueroa-Lorenzo, Añorga, and Arrizabalaga. "A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach." Sensors 19, no. 20 (2019): 4455. http://dx.doi.org/10.3390/s19204455.
Full textSankarasubramanyan, R. "‘Preparation’ and ‘Readiness’: The Education Paradigm for the Organisation Development Certificate Programme." NHRD Network Journal 13, no. 3 (2020): 296–310. http://dx.doi.org/10.1177/2631454120951882.
Full textCrawford, Judy, and Fred Shaffer. "BCIA in 2014: What's New?" Biofeedback 41, no. 4 (2013): 155–57. http://dx.doi.org/10.5298/1081-5937-41.4.04.
Full textPilev, D. "Digital Signing of Data in the Web-based Information Systems." Information Technologies and Control 14, no. 1 (2016): 21–26. http://dx.doi.org/10.1515/itc-2016-0018.
Full textBlythe, Stephen. "Computer Law of Tunisia: Promoting Secure E-Commerce Transactions with Electronic Signatures." Arab Law Quarterly 20, no. 3 (2006): 240–67. http://dx.doi.org/10.1163/026805506778388854.
Full textSetyoningrum, Novita. "Strategi Pemasaran Jasa Balik Nama Sertifikat Tanah di Kantor Notaris Etik Pudji Lestari, S.H., M.Kn." Translitera : Jurnal Kajian Komunikasi dan Studi Media 10, no. 1 (2021): 32–44. http://dx.doi.org/10.35457/translitera.v10i1.1423.
Full textVušković, Petar. "Analysis of the Fluctuation of the Number of ISO 9001:2015 Certificates in the Republic of Croatia and Assessment of Satisfaction of Business Organisations Leadership with the Certificate." Naše gospodarstvo/Our economy 66, no. 4 (2020): 40–49. http://dx.doi.org/10.2478/ngoe-2020-0022.
Full textYadav, Preeti, Paulo Mateus, Nikola Paunković, and André Souto. "Quantum Contract Signing with Entangled Pairs." Entropy 21, no. 9 (2019): 821. http://dx.doi.org/10.3390/e21090821.
Full textCambou, Bertrand, Michael Gowanlock, Bahattin Yildiz, et al. "Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions." Applied Sciences 11, no. 6 (2021): 2801. http://dx.doi.org/10.3390/app11062801.
Full textBartók, Sándor P., and Péter Máté Erdősi. "May the advanced biometric electronic signature be applicable in public administration?" Central and Eastern European eDem and eGov Days 325 (February 14, 2018): 455–62. http://dx.doi.org/10.24989/ocg.v325.37.
Full textMahmmod, Khalid Fazaa, Mohammed Muzahem Azeez, and Zeyad Hashem Ismael. "Design an active verification mechanism for certificates revocation in OCSP for internet authentication." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 4 (2020): 4208. http://dx.doi.org/10.11591/ijece.v10i4.pp4208-4216.
Full textShah, Hitesh, Priti Solanky, Rachana Kapadia, and Sunil Nayak. "Mid-Level Health Providers- their perceptions and background knowledge pertaining to Comprehensive Primary Health Care and Health and Wellness Center." Healthline 11, no. 2 (2020): 40–47. http://dx.doi.org/10.51957/healthline_159_2020.
Full textMartinez Pedreira, Miguel, Costin Grigoras, Volodymyr Yurchenko, and Maksim Melnik Storetvedt. "The Security model of the ALICE next generation Grid framework." EPJ Web of Conferences 214 (2019): 03042. http://dx.doi.org/10.1051/epjconf/201921403042.
Full textMeyer, Helen. "Securing intranet data with SSL client certificates." Computers & Security 16, no. 4 (1997): 334. http://dx.doi.org/10.1016/s0167-4048(97)80213-1.
Full textVlasenko, Aleksandra, and Irina Korkh. "Issues of Security of Remote Banking Systems." NBI Technologies, no. 2 (December 2018): 6–10. http://dx.doi.org/10.15688/nbit.jvolsu.2018.2.1.
Full textSukarti, Sukarti, and Sri Karnila. "PERANCANGAN STRATEGI PELAYANAN BERBASIS PENGETAHUAN PADA KANTOR NOTARIS." KLIK - KUMPULAN JURNAL ILMU KOMPUTER 3, no. 2 (2016): 114. http://dx.doi.org/10.20527/klik.v3i2.44.
Full textYANG, Huan-Ming. "人類遺傳學家的社會責任". International Journal of Chinese & Comparative Philosophy of Medicine 2, № 4 (1999): 55–65. http://dx.doi.org/10.24112/ijccpm.21381.
Full textRetno, Sujacka, Novia Hasdyna, Mutasar Mutasar, and Rozzi Kesuma Dinata. "Algoritma Honey Encryption dalam Sistem Pendataan Sertifikat Tanah dan Bangunan di Universitas Malikussaleh." INFORMAL: Informatics Journal 5, no. 3 (2020): 87. http://dx.doi.org/10.19184/isj.v5i3.20804.
Full textNorman, Mark. "ACCESSING SERVICES WITH CLIENT DIGITAL CERTIFICATES: A SHORT REPORT FROM THE DCOCE PROJECT." New Review of Information Networking 10, no. 2 (2004): 193–207. http://dx.doi.org/10.1080/13614570500091940.
Full textLiu, Vicky, William Caelli, and Yu-Nien Maggie Chen. "Using a Public Key Registry for Improved Trust and Scalability in National E-Health Systems." International Journal of E-Health and Medical Communications 4, no. 4 (2013): 66–83. http://dx.doi.org/10.4018/ijehmc.2013100105.
Full textDíaz-Sánchez, Daniel, Andrés Marín-Lopez, Florina Almenárez Mendoza, and Patricia Arias Cabarcos. "DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT †." Sensors 19, no. 15 (2019): 3292. http://dx.doi.org/10.3390/s19153292.
Full textNithya, S. Mary Virgil, and V. Rhymend Uthariaraj. "Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience." Security and Communication Networks 2020 (January 27, 2020): 1–13. http://dx.doi.org/10.1155/2020/4838497.
Full textZasada, Stefan J., Ali N. Haidar, and Peter V. Coveney. "On the usability of grid middleware and security mechanisms." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 369, no. 1949 (2011): 3413–28. http://dx.doi.org/10.1098/rsta.2011.0131.
Full textSYSLING, FENNEKE. "Science and self-assessment: phrenological charts 1840–1940." British Journal for the History of Science 51, no. 2 (2018): 261–80. http://dx.doi.org/10.1017/s0007087418000055.
Full textNóbrega, José Cândido da Silva, Francisco das Chagas Bezerra Neto, Aline Carla de Medeiros, and Patrício Borges Maracajá. "Plano de gestão na cadeia de comercialização do mel no Sertão da Paraiba." Research, Society and Development 10, no. 7 (2021): e52710715719. http://dx.doi.org/10.33448/rsd-v10i7.15719.
Full textAsiedu, William Asiedu, K. Osei-Boateng, and John Rajan. "Server-aided Public Key Signatures for Diverse Network Devices." International Journal of Technology and Management Research 1, no. 1 (2020): 57–63. http://dx.doi.org/10.47127/ijtmr.v1i1.6.
Full textCosby, Janel, Christina Marie Figueroa, and Rose L. Allen. "Differences Between the 1993 and 2007 Standards for the Certificate of Clinical Competence in Audiology." Perspectives on Administration and Supervision 18, no. 2 (2008): 44–49. http://dx.doi.org/10.1044/aas18.2.44.
Full textArun Kumar, S., and M. S. Anbarasi. "Noble Authentication Protocol with Privacy Preservation Policy for Public Auditing on Shared Data." Journal of Computational and Theoretical Nanoscience 16, no. 8 (2019): 3252–58. http://dx.doi.org/10.1166/jctn.2019.8172.
Full textFourchard, Laurent. "BUREAUCRATS AND INDIGENES: PRODUCING AND BYPASSING CERTIFICATES OF ORIGIN IN NIGERIA." Africa 85, no. 1 (2015): 37–58. http://dx.doi.org/10.1017/s0001972014000734.
Full textAzevedo, Dulce de Oliveira, Elza Maria de Sá Ferreira, Maria de Fátima de Faria Jóia, and Miriam Gonçalves Matheus. "Assistência de enfermagem ao cliente queimado no ambulatório e/ou no domicílio após alta da unidade de internação." Revista Brasileira de Enfermagem 42, no. 1-2-3-4 (1989): 60–67. http://dx.doi.org/10.1590/s0034-71671989000100008.
Full textCowardin, William H., George W. Dowell, and Richard C. Rodi. "MSRC Responders: Construction and Operation of Sixteen Oil Spill Response Vessels." Marine Technology and SNAME News 32, no. 03 (1995): 164–78. http://dx.doi.org/10.5957/mt1.1995.32.3.164.
Full textMorales Ruiz, Engel Román. "Experiencia exitosa en la implementación del sistema gestión de la inocuidad alimentaria ISO 22000:2005." Revista Ciencia y Tecnología El Higo 1, no. 2 (2009): 16–18. http://dx.doi.org/10.5377/elhigo.v1i2.8650.
Full textRayment, G. E., K. I. Peverill, and B. C. Shelley. "Australian Soil and Plant Analysis Council soil and plant quality assurance programs and the impact of variability of test results on clients." Australian Journal of Experimental Agriculture 38, no. 7 (1998): 777. http://dx.doi.org/10.1071/ea97159.
Full textPradhan, S. "P03-253 - Attitudes and response of opioid-dependent clients to receiving certificates as contingency management- a qualitative survey." European Psychiatry 25 (2010): 1320. http://dx.doi.org/10.1016/s0924-9338(10)71307-9.
Full text