Academic literature on the topic 'Public key certificate'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Public key certificate.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Public key certificate"
Chien, Hung-Yu. "Dynamic Public Key Certificates with Forward Secrecy." Electronics 10, no. 16 (2021): 2009. http://dx.doi.org/10.3390/electronics10162009.
Full textFord, Warwick. "Advances in public-key certificate standards." ACM SIGSAC Review 13, no. 3 (1995): 9–15. http://dx.doi.org/10.1145/219618.219714.
Full textDirksen, Alexandra, David Klein, Robert Michael, Tilman Stehr, Konrad Rieck, and Martin Johns. "LogPicker: Strengthening Certificate Transparency Against Covert Adversaries." Proceedings on Privacy Enhancing Technologies 2021, no. 4 (2021): 184–202. http://dx.doi.org/10.2478/popets-2021-0066.
Full textWazan, Ahmad Samer, Romain Laborde, David W. Chadwick, et al. "Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker." Security and Communication Networks 2017 (2017): 1–23. http://dx.doi.org/10.1155/2017/6907146.
Full textMahmoud, Mohamed M. E. A., Jelena Misic, Kemal Akkaya, and Xuemin Shen. "Investigating Public-Key Certificate Revocation in Smart Grid." IEEE Internet of Things Journal 2, no. 6 (2015): 490–503. http://dx.doi.org/10.1109/jiot.2015.2408597.
Full textClarke, Dwaine. "Hybrid certificate closure-chain discovery public key system." International Journal of Computational Science and Engineering 9, no. 4 (2014): 312. http://dx.doi.org/10.1504/ijcse.2014.060714.
Full textLu, Yang, and Jiguo Li. "Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/295419.
Full textK.C, Amir, Harri Forsgren, Kaj Grahn, Timo Karvi, and Göran Pulkkis. "Security and Trust of Public Key Cryptography for HIP and HIP Multicast." International Journal of Dependable and Trustworthy Information Systems 2, no. 3 (2011): 17–35. http://dx.doi.org/10.4018/jdtis.2011070102.
Full textBalachandra and Prema K.V. "Certificate Path Verification in Hierarchical and Peer-to-Peer Public Key Infrastructures." Journal of Technology Management for Growing Economies 1, no. 1 (2010): 77–92. http://dx.doi.org/10.15415/jtmge.2010.11005.
Full textTanwar, Sarvesh, and Anil Kumar. "A Proposed Scheme for Remedy of Man-In-The-Middle Attack on Certificate Authority." International Journal of Information Security and Privacy 11, no. 3 (2017): 1–14. http://dx.doi.org/10.4018/ijisp.2017070101.
Full textDissertations / Theses on the topic "Public key certificate"
Hagström, Åsa. "Understanding Certificate Revocation." Licentiate thesis, Linköping University, Linköping University, Department of Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-5477.
Full textGo, Hiu-wing, and 吳曉頴. "Forward security and certificate management in mobile AD Hoc networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B30331080.
Full textAmbers, Vanessa P. Kelly Amanda M. "Installation, configuration and operational testing of a PKI certificate server and its supporting services /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FAmbers.pdf.
Full textMacMichael, John L. "A survey and security strength classification of PKI certificate revocation management implementations." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FMacMichael.pdf.
Full textKelly, Amanda M., and Vanessa P. Ambers. "Installation, configuration and operational testing of a PKI certificate server and its supporting services." Thesis, Monterey California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1615.
Full textNilsson, Christoffer. "Annulering av ogiltiga certifikat i Public-Key Infrastructures." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3985.
Full textMacdonell, James Patrick. "MiniCA: A web-based certificate authority." CSUSB ScholarWorks, 2007. https://scholarworks.lib.csusb.edu/etd-project/3256.
Full textHendershot, Travis S. "Towards Using Certificate-Based Authentication as a Defense Against Evil Twins in 802.11 Networks." BYU ScholarsArchive, 2016. https://scholarsarchive.byu.edu/etd/6115.
Full textFredriksson, Bastian. "A Distributed Public Key Infrastructure for the Web Backed by a Blockchain." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-210912.
Full textGoold, Jeremy C. "Improving Routing Security Using a Decentralized Public Key Distribution Algorithm." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd797.pdf.
Full textBooks on the topic "Public key certificate"
Komar, Brian. Windows Server 2008 PKI and certificate security. Microsoft Press, 2008.
Find full textKomar, Brian. Windows Server 2008 PKI and certificate security. Microsoft Press, 2008.
Find full textMartin, Keith M. Public-Key Management. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0011.
Full textWindows Server 2008 PKI and Certificate Security (PRO-Other) (PRO-Other). Microsoft Press, 2008.
Find full textXisong, Lai, He Quande, and Ke xue ji shu zi liao zhong xin., eds. Gong kai jin yao ji chu jian she yu ping zheng guan li zhong xin: Public key infrastructure and certificate authority. Xing zheng yuan guo jia ke xue wei yuan hui ke xue ji shu zi liao zhong xin, 2003.
Find full textBrands, Stefan. Rethinking Public Key Infrastructures and Digital Certificates. The MIT Press, 2000. http://dx.doi.org/10.7551/mitpress/5931.001.0001.
Full textBrands, Stefan. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, 2000.
Find full textBrands, Stefan. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, 2000.
Find full textRethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. The MIT Press, 2000.
Find full textBook chapters on the topic "Public key certificate"
Buchmann, Johannes A., Evangelos Karatsiolis, and Alexander Wiesmaier. "Certificate Policies." In Introduction to Public Key Infrastructures. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40657-7_8.
Full textGalindo, David, Paz Morillo, and Carla Ràfols. "Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes." In Public Key Infrastructure. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11774716_7.
Full textMuñoz, Jose L., Jordi Forné, Oscar Esparza, and Miguel Soriano. "CERVANTES – A Certificate Validation Test-Bed." In Public Key Infrastructure. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25980-0_3.
Full textRussell, Selwyn. "Recursive Certificate Structures for X.509 Systems." In Public Key Infrastructure. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25980-0_11.
Full textWen, Wu, Takamichi Saito, and Fumio Mizoguchi. "Security of Public Key Certificate Based Authentication Protocols." In Public Key Cryptography. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-540-46588-1_14.
Full textLiu, Chuchang, Maris A. Ozols, Marie Henderson, and Tony Cant. "A State-Based Model for Certificate Management Systems." In Public Key Cryptography. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-540-46588-1_7.
Full textElwailly, Farid F., Craig Gentry, and Zulfikar Ramzan. "QuasiModo: Efficient Certificate Validation and Revocation." In Public Key Cryptography – PKC 2004. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24632-9_27.
Full textDomingo-Ferrer, Josep. "On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments." In Public Key Infrastructure. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25980-0_15.
Full textLai, Junzuo, and Weidong Kou. "Self-Generated-Certificate Public Key Encryption Without Pairing." In Public Key Cryptography – PKC 2007. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-71677-8_31.
Full textKambourakis, Georgios, Angelos Rouskas, and Dimitris Gritzalis. "Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks." In Public Key Infrastructure. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25980-0_23.
Full textConference papers on the topic "Public key certificate"
Mahmoud, Mohamed M. E. A., Jelena Misic, and Xuemin Shen. "Efficient public-key certificate revocation schemes for smart grid." In 2013 IEEE Global Communications Conference (GLOBECOM 2013). IEEE, 2013. http://dx.doi.org/10.1109/glocom.2013.6831167.
Full textGarba, Abba, Qinwen Hu, Zhong Chen, and Muhammad Rizwan Asghar. "BB-PKI: Blockchain-Based Public Key Infrastructure Certificate Management." In 2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC/SmartCity/DSS). IEEE, 2020. http://dx.doi.org/10.1109/hpcc-smartcity-dss50907.2020.00108.
Full textTartan, Chloe, Craig Wright, Michaella Pettit, and Wei Zhang. "A Scalable Bitcoin-based Public Key Certificate Management System." In 18th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010556805480559.
Full textHu, Chaoju, and Na Xu. "Application of XTR Public Key System in Certificate Authority System." In 2008 International Conference on Computer Science and Software Engineering. IEEE, 2008. http://dx.doi.org/10.1109/csse.2008.355.
Full textAditia, Mayank K., Srikar Paida, Fahiem Altaf, and Soumyadev Maity. "Certificate-less Public Key Encryption For Secure e-Healthcare Systems." In 2019 IEEE Conference on Information and Communication Technology (CICT). IEEE, 2019. http://dx.doi.org/10.1109/cict48419.2019.9066190.
Full textSur, Chul, Chae Duk Jung, and Kyung Hyune Rhee. "Multi-receiver Certificate-Based Encryption and Application to Public Key Broadcast Encryption." In 2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security (BLISS 2007). IEEE, 2007. http://dx.doi.org/10.1109/bliss.2007.23.
Full textYao, Xuanxia, Xiaoguang Han, and Xiaojiang Du. "A light-weight certificate-less public key cryptography scheme based on ECC." In 2014 23rd International Conference on Computer Communication and Networks (ICCCN). IEEE, 2014. http://dx.doi.org/10.1109/icccn.2014.6911773.
Full textChoi, Pil Joo, Hyun Il Kim, and Dong Kyue Kim. "AMI authentication method based on hardware public key certificate using unique identifier." In 2015 International SoC Design Conference (ISOCC). IEEE, 2015. http://dx.doi.org/10.1109/isocc.2015.7401727.
Full textLee, Byoungcheon. "Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based Cryptography." In 2010 International Conference on Availability, Reliability, and Security (ARES). IEEE, 2010. http://dx.doi.org/10.1109/ares.2010.49.
Full textBala, Dania Qara, Soumyadev Maity, and Sanjay Kumar Jena. "Mutual authentication for IoT smart environment using certificate-less public key cryptography." In 2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS). IEEE, 2017. http://dx.doi.org/10.1109/ssps.2017.8071559.
Full textReports on the topic "Public key certificate"
Santesson, S., R. Housley, S. Bajaj, and L. Rosenthol. Internet X.509 Public Key Infrastructure -- Certificate Image. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6170.
Full textCooper, D., S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5280.
Full textHousley, R., W. Polk, W. Ford, and D. Solo. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3280.
Full textLinsenbardt, D., S. Pontius, and A. Sturgeon. Internet X.509 Public Key Infrastructure Warranty Certificate Extension. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4059.
Full textAdams, C., and S. Farrell. Internet X.509 Public Key Infrastructure Certificate Management Protocols. RFC Editor, 1999. http://dx.doi.org/10.17487/rfc2510.
Full textKent, S., D. Kong, K. Seo, and R. Watro. Certificate Policy (CP) for the Resource Public Key Infrastructure (RPKI). RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6484.
Full textTuecke, S., V. Welch, D. Engert, L. Pearlman, and M. Thompson. Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile. RFC Editor, 2004. http://dx.doi.org/10.17487/rfc3820.
Full textAdams, C., S. Farrell, T. Kause, and T. Mononen. Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP). RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4210.
Full textHousley, R., W. Ford, W. Polk, and D. Solo. Internet X.509 Public Key Infrastructure Certificate and CRL Profile. RFC Editor, 1999. http://dx.doi.org/10.17487/rfc2459.
Full textBlinov, M., and C. Adams. Alternative Certificate Formats for the Public-Key Infrastructure Using X.509 (PKIX) Certificate Management Protocols. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4212.
Full text