To see the other types of publications on this topic, follow the link: Public key certificate.

Dissertations / Theses on the topic 'Public key certificate'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 40 dissertations / theses for your research on the topic 'Public key certificate.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Hagström, Åsa. "Understanding Certificate Revocation." Licentiate thesis, Linköping University, Linköping University, Department of Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-5477.

Full text
Abstract:
<p>Correct certificate revocation practices are essential to each public-key infrastructure. While there exist a number of protocols to achieve revocation in PKI systems, there has been very little work on the theory behind it: Which different types of revocation can be identified? What is the intended effect of a specific revocation type to the knowledge base of each entity?</p><p>As a first step towards a methodology for the development of reliable models, we present a graph-based formalism for specification and reasoning about the distribution and revocation of public keys and certificates.
APA, Harvard, Vancouver, ISO, and other styles
2

Go, Hiu-wing, and 吳曉頴. "Forward security and certificate management in mobile AD Hoc networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B30331080.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ambers, Vanessa P. Kelly Amanda M. "Installation, configuration and operational testing of a PKI certificate server and its supporting services /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FAmbers.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, June 2004.<br>Thesis advisor(s): J.D. Fulp, Dan C. Boger. Includes bibliographical references (p. 159-160). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
4

MacMichael, John L. "A survey and security strength classification of PKI certificate revocation management implementations." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FMacMichael.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kelly, Amanda M., and Vanessa P. Ambers. "Installation, configuration and operational testing of a PKI certificate server and its supporting services." Thesis, Monterey California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1615.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Public key infrastructure (PKI) was created to provide the basic services of confidentiality, authenticity, integrity and non-repudiation for sensitive information that may traverse public (un-trusted) networks. This thesis provides a brief description of the background and functional components of a PKI, and then "builds" a PKI to be used for research at the Naval Postgraduate School (NPS). Deficiencies of this PKI with respect to DoD PKI policy are delineated. The thesis addresses details of software selection, installation, configura
APA, Harvard, Vancouver, ISO, and other styles
6

Nilsson, Christoffer. "Annulering av ogiltiga certifikat i Public-Key Infrastructures." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3985.

Full text
Abstract:
According to numerous sources, computer security can be explained as; how to address the three major aspects, namely Confidentiality, Integrity and Availability. Public-key infrastructure is a certificate based technology used to accomplish these aspects over a network. One major concern involving PKIs is the way they handle revocation of invalid certificates. The proposed solution will make revocation more secure; validation will be handled completely by the certificate authority, and revokes will be instant, without use of certificate revocation lists.<br>I enlighet med flertalet källor, kan
APA, Harvard, Vancouver, ISO, and other styles
7

Macdonell, James Patrick. "MiniCA: A web-based certificate authority." CSUSB ScholarWorks, 2007. https://scholarworks.lib.csusb.edu/etd-project/3256.

Full text
Abstract:
The MiniCA project is proposed and developed to address growing demand for inexpensive access to security features such as privacy, strong authentication, and digital signatures. These features are integral to public-key encryption technologies. The audience for whom the software project is intended includes, technical staff requiring certificates for use in SSL applications (i.e. a secure web-site) at California State University, San Bernardino.
APA, Harvard, Vancouver, ISO, and other styles
8

Hendershot, Travis S. "Towards Using Certificate-Based Authentication as a Defense Against Evil Twins in 802.11 Networks." BYU ScholarsArchive, 2016. https://scholarsarchive.byu.edu/etd/6115.

Full text
Abstract:
Wireless clients are vulnerable to exploitation by evil twins due to flaws in the authentication process of 802.11 Wi-Fi networks. Current certificate-based wireless authentication protocols present a potential solution, but are limited in their ability to provide a secure and usable platform for certificate validation. Our work seeks to mitigate these limitations by exploring a client-side strategy for utilizing alternative trust models in wireless network authentication. We compile a taxonomy of various trust models for conducting certificate-based authentication of wireless networks and met
APA, Harvard, Vancouver, ISO, and other styles
9

Fredriksson, Bastian. "A Distributed Public Key Infrastructure for the Web Backed by a Blockchain." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-210912.

Full text
Abstract:
The thesis investigates how a blockchain can be used to build a decentralised public key infrastructure for the web, by proposing a custom federation blockchain relying on honest majority. Our main contribution is the design of a Proof of Stake protocol based on a stake tree, which builds upon an idea called follow-the-satoshi used in previous papers. Digital identities are stored in an authenticated self-balancing tree maintained by blockchain nodes. Our back-of-the-envelope calculations, based on the size of the domain name system, show that the block size must be set to at least 5.2 MB, whi
APA, Harvard, Vancouver, ISO, and other styles
10

Goold, Jeremy C. "Improving Routing Security Using a Decentralized Public Key Distribution Algorithm." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd797.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Liu, Hailong, Wenhua Qi, Qishan Zhang, and Jinpei Wu. "PKI/PMI AND SMART TOKENS IN HEALTHCARE INFORMATION SYSTEMS." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606668.

Full text
Abstract:
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada<br>While healthcare industry is striving to achieve e-health systems for improvements in healthcare quality, cost, and access, privacy and security about medical records should be considered carefully. This paper makes a deep study of Public Key Infrastructures (PKIs) and Privilege Management Infrastructures (PMIs) and how they can secure e-health systems. To access resources, e.g. patient records, both authentication and authorization are needed, so public key certi
APA, Harvard, Vancouver, ISO, and other styles
12

Asplund, Fredrik. "Parsing of X.509 certificates in a WAP environment." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1455.

Full text
Abstract:
<p>This master thesis consists of three parts. The first part contains a summary of what is needed to understand a X.509 parser that I have created, a discussion concerning the technical problems I encountered during the programming of this parser and a discussion concerning the final version of the parser. The second part concerns a comparison I made between the X.509 parser I created and a X.509 parser created"automatically"by a compiler. I tested static memory, allocation of memory during runtime and utilization of the CPU for both my parser (MP) and the parser that had a basic structure co
APA, Harvard, Vancouver, ISO, and other styles
13

Castro, Rafael Dantas de. "Assinaturas de chave públicas sem certificados." [s.n.], 2009. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275796.

Full text
Abstract:
Orientador: Ricardo Dahab<br>Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação<br>Made available in DSpace on 2018-08-16T21:50:46Z (GMT). No. of bitstreams: 1 Castro_RafaelDantasde_M.pdf: 1379597 bytes, checksum: 3b065d6b67c5440dc00b0e4663d170d3 (MD5) Previous issue date: 2009<br>Resumo: Nesta tese é apresentada uma visão do campo de Assinaturas de Chave Pública sem Certificados (CL-PKC), resultado final de pesquisa empreendida durante o mestrado do autor na Universidade Estadual de Campinas. A abordagem aqui contida tem como principal base a Segurança Demon
APA, Harvard, Vancouver, ISO, and other styles
14

Herinek, Denis. "Certifikační autorita." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-377140.

Full text
Abstract:
There is a lot of available services on the internet those need to be more secured and trusted. Public key infrastructure is used in sectors where are higher expectations in case of authentication, integrity and confidentality. It is almost impossible to imagine how internet banking or electronic signatures of important documents would work without PKI. There is a lot of open-source realisations of PKI created by users. Digital certificates as a part of PKI are issued by certificate authorities. This diploma thesis consists of open- source realisation of certificate authority and timestamping
APA, Harvard, Vancouver, ISO, and other styles
15

Åslund, Jonas. "Authentication in peer-to-peer systems." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1222.

Full text
Abstract:
<p>In the environment of the 3:rd generation Internet based on peer-to-peer architecture, well-trusted methods must exist to establish a secure environment. One main issue is the possibility to verify that a node actually is who it claims to be (authentication). Establishment of authentication between nodes in a peer-to-peer environment where nodes are exchanging information directly with each other requires more planning than in a typical client-server environment where the authentication methods are server-based. The peer-to-peer applications described in this report use authentication metho
APA, Harvard, Vancouver, ISO, and other styles
16

Kim, Tiffany Hyun-Jin. "All Trust Is Local: Empowering Users’ Authentication Decisions on the Internet." Research Showcase @ CMU, 2012. http://repository.cmu.edu/dissertations/132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Velthuis, Paul. "New authentication mechanism using certificates for big data analytic tools." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215694.

Full text
Abstract:
Companies analyse large amounts of sensitive data on clusters of machines, using a framework such as Apache Hadoop to handle inter-process communication, and big data analytic tools such as Apache Spark and Apache Flink to analyse the growing amounts of data. Big data analytic tools are mainly tested on performance and reliability. Security and authentication have not been enough considered and they lack behind. The goal of this research is to improve the authentication and security for data analytic tools.Currently, the aforementioned big data analytic tools are using Kerberos for authenticat
APA, Harvard, Vancouver, ISO, and other styles
18

Slavík, Petr. "Laboratorní úloha infrastruktury veřejných klíčů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-217981.

Full text
Abstract:
The aim of this thesis is to study and describe the theme of Public Key Infrastructure (PKI). Within the scope of minute PKI characterization there is a gradual depiction of particular structural elements, which are above all represented by cryptographic operations (asymetric and symetric cryptography, hash function and digital signature); then, there are also individual PKI subjects that are dealt with, like eg. certification authority, certificates, security protocols, secure heap etc. Last but not least there are a few complete Public Key Infrastructure implementation solutions described (O
APA, Harvard, Vancouver, ISO, and other styles
19

Lozda, Marius. "Elektroninio parašo atributų sertifikavimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2011~D_20140627_165731-47089.

Full text
Abstract:
Darbe nagrinėjama atributinės informacijos sertifikavimo šiuo metu naudojamuose elektroniniuse parašuose problema. Trumpai apžvelgiami elektroninio parašo principai ir supažindinama su viešųjų raktų infrastruktūra, nurodant galimybes jai išplėsti, iškilus poreikiui užtikrinti aukštesnį saugumo lygį keičiantis papildoma (atributine) informacija. Nagrinėjami įvairūs atributinės informacijos sertifikavimo metodai, viešųjų raktų infrastruktūroje įvedant atributų sertifikato ir atributų sertifikavimo centro sąvokas. Pateikiamas tinkamiausio metodo pritaikymo pavyzdys, modeliuojant elektroninio para
APA, Harvard, Vancouver, ISO, and other styles
20

Maharjan, Nadim, and Daryl Moten. "Secure IP Multicasting with Encryption Key Management." International Foundation for Telemetering, 2011. http://hdl.handle.net/10150/595800.

Full text
Abstract:
ITC/USA 2011 Conference Proceedings / The Forty-Seventh Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2011 / Bally's Las Vegas, Las Vegas, Nevada<br>This paper presents the design for secure IP multicasting in an iNet environment using public key cryptography. Morgan State University has been conducting research to improve the telemetry network by improving network performance, implementing IP (Internet Protocol) multicasting and providing a stronger security system for the iNet environment. The present study describes how IP multicasting could be imple
APA, Harvard, Vancouver, ISO, and other styles
21

Rufino, Vilc Queupe. "Acordo de chaves criptográficas hierárquico e sem certificado." Universidade de São Paulo, 2009. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-19122009-213045/.

Full text
Abstract:
Apresentamos um novo esquema de acordo de chaves criptográficas hierárquico, não Interativo e seguro contra comprometimento de múltiplos nós. Esquemas para Acordo de chaves criptográficas (KAS - Key Agreement Scheme), são usados quando duas ou mais entidades desejam compartilhar uma chave secreta única, afim de para realizar uma comunicação segura por meio de um protocolo de criptografia simétrico. O acordo de chaves proposto possui as seguintes características: Não interativo: Chaves compartilhadas são calculadas sem interação dos nós participantes; Chaves Públicas sem certificados (Certific
APA, Harvard, Vancouver, ISO, and other styles
22

Bědajánek, Ondřej. "Infrastruktura veřejných klíčů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217719.

Full text
Abstract:
The subject of my thesis dscribes function and principles of the public key infrastructure as well as certificate authority. Under the operation system Linux was created self signed certificate authority. Web interface was devoloped in PHP for the purpose of the generation, distribution and rejection certificates. Configuration files for OpenVPN are included in the thesis and wireless security is achived by OpenVPN.
APA, Harvard, Vancouver, ISO, and other styles
23

Marček, Ján. "Odposlech moderních šifrovaných protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236427.

Full text
Abstract:
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discu
APA, Harvard, Vancouver, ISO, and other styles
24

Singh, Shubhanker. "Efficient, Scalable and Secure Vehicular Communication System : An Experimental Study." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-286820.

Full text
Abstract:
Awareness of vehicles’ surrounding conditions is important in today’s intelligent transportation system. A wide range of effort has been put in to deploy Vehicular Communication (VC) systems to make driving conditions safer and more efficient. Vehicles are aware of their surroundings with the help of authenticated safety beacons in VC systems. Since vehicles act according to the information conveyed by such beacons, verification of beacons plays an important role in becoming aware of and predicting the status of the sender vehicle. The idea of implementing secure mechanisms to deal with a high
APA, Harvard, Vancouver, ISO, and other styles
25

Goya, Denise Hideko. "Criptografia de chave pública sem certificado." Universidade de São Paulo, 2011. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-02082012-191831/.

Full text
Abstract:
A criptografia de chave pública sem certificado (certificateless) é uma alternativa ao modelo convencional de criptografia assimétrica, pois a autenticação da chave pública ocorre implicitamente durante a execução dos protocolos, sem a necessidade de gerenciamento e distribuição de certificados digitais. Potencialmente reduz custos computacionais e o nível de segurança alcançado é maior quando comparado ao modelo baseado em identidade. Nesta tese de doutorado, modelos formais de segurança para acordo de chave com autenticação sem certificado são aprimorados visando dois objetivos paralelos: (
APA, Harvard, Vancouver, ISO, and other styles
26

Goya, Denise Hideko. ""Proposta de esquemas de criptografia e de assinatura sob modelo de criptografia de chave pública sem certificado"." Universidade de São Paulo, 2006. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-28072006-142410/.

Full text
Abstract:
Sob o modelo de criptografia de chave pública baseada em identidades (ID-PKC), a própria identidade dos usuários é usada como chave pública, de modo a dispensar a necessidade de uma infra-estrutura de chaves públicas (ICP), na qual o gerenciamento de certificados digitais é complexo. Por outro lado, sistemas nesse modelo requerem uma entidade capaz de gerar chaves secretas. Essa entidade é conhecida por PKG (Private Key Generator); ela possui uma chave-mestra e mantém custódia das chaves secretas geradas a partir dessa chave-mestra. Naturalmente, a custódia de chaves é indesejável em muitas ap
APA, Harvard, Vancouver, ISO, and other styles
27

Guelfi, Airton Roberto. "Análise de elementos jurídico-tecnológicos que compõem a assinatura digital certificada digitalmente pela Infra-estrutura da Chaves Públicas do Brasil (ICP-Brasil)." Universidade de São Paulo, 2007. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-26072007-164132/.

Full text
Abstract:
Este trabalho faz uma análise crítica dos elementos jurídicos-tecnológicos de uma assinatura digital certificada digitalmente. O primeiro aspecto a ser abordado advém da verificação da competência para o desenvolvimento da atividade de certificação, em decorrência da natureza jurídica do certificado digital. Consoante se verificou, o certificado digital é o instrumento hábil a assegurar a autenticidade dos documentos eletrônicos por meio de uma assinatura digital. Dessa forma, equipara-se ao ato de reconhecimento de firma, atividade notarial desenvolvida pelos Cartórios Notariais, de acordo co
APA, Harvard, Vancouver, ISO, and other styles
28

Low, Rouhshi. "The use of technology to automate the registration process within the Torrens system and its impact on fraud : an analysis." Queensland University of Technology, 2008. http://eprints.qut.edu.au/18301/.

Full text
Abstract:
Improvements in technology and the Internet have seen a rapid rise in the use of technology in various sectors such as medicine, the courts and banking. The conveyancing sector is also experiencing a similar revolution, with technology touted as able to improve the effectiveness of the land registration process. In some jurisdictions, such as New Zealand and Canada, the paper-based land registration system has been replaced with one in which creation, preparation, and lodgement of land title instruments are managed in a wholly electronic environment. In Australia, proposals for an electronic r
APA, Harvard, Vancouver, ISO, and other styles
29

Quirino, Gustavo da Silva. "Análise arquitetural de algoritmos criptográficos assimétricos em plataformas embarcadas usadas em RSSF." Pós-Graduação em Ciência da Computação, 2013. https://ri.ufs.br/handle/riufs/3339.

Full text
Abstract:
This work consists in a performance evaluating of Asymmetrical cryptographic algorithms in embedded platforms used in Wireless Sensor Networks (WSN). The sensor devices have low computing power and energy, therefore safety techniques should not consume large amounts of resources. The asymmetric cryptographic algorithms RSA, ECC and MQQ were evaluated on platforms Desktop, ARM, MSP430 and AVR. The evaluations were performed using the SimpleScalar simulators, Sim-Panalyzer, MSPsim and AVRORA . The evaluation criteria were: processing time, memory usage and processor, as well as energy consumptio
APA, Harvard, Vancouver, ISO, and other styles
30

lin, Tao-Tain, and 林滔天. "Revocation on Public Key Certificate." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/87991618145310508059.

Full text
Abstract:
碩士<br>國立成功大學<br>資訊工程學系碩博士班<br>94<br>In the Public Key Inrfrastructure (PKI), certificate authority (CA) revokes public key by using public key certificate revocation. Some cryptosystems utilize an on-line server to revoke the public key certificate immediately. In this study, we firstly improve the efficiency of Public Key Revocation Free Encryption Scheme (PKRFE) that is one of the above-mentioned cryptosystems. The improved PKRFE saves sender the computing overhead of a public key verification formula in the encryption. Second, we propose the Certificate Verification Free Online Server Proto
APA, Harvard, Vancouver, ISO, and other styles
31

Huang, Chien-Chen, and 黃建禎. "Photo Certificate – A Framework for Generating Visualized Public Key Certificates." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/81636477321416994296.

Full text
Abstract:
碩士<br>逢甲大學<br>資訊工程所<br>96<br>In public-key cryptography, the authentication of public keys is an essential topic for securing electronic data. The X.509 certification authority-based (CA) public key infrastructure (PKI) standard is a widespread solution which explicitly defines data formats and procedures related to the authentication of public key via public key certificates that are digitally sighed by CA. However, the formats of X.509 certificate contents, which consist of randomized integers and string data, are not friendly enough for human to directly associate the identities of real per
APA, Harvard, Vancouver, ISO, and other styles
32

Karatsiolis, Evangelos. "Flexible Certificate Management in Public Key Infrastructures." Phd thesis, 2007. https://tuprints.ulb.tu-darmstadt.de/878/1/thesis.pdf.

Full text
Abstract:
A public key infrastructure (PKI) secures lots of applications and processes. These are for example the electronic commerce, email communication, access to computers and networks, or digital identities for use in e-Government or the health care sector. The various PKI based applications have different requirements. These depend on the security level, the number of participants, the software or hardware devices, the complexity of the installation, and many other parameters. This work focuses on the certificate management in a PKI and proposes various solutions to meet these requirements in a fl
APA, Harvard, Vancouver, ISO, and other styles
33

Karatsiolis, Evangelos [Verfasser]. "Flexible certificate management in public key infrastructures / von Evangelos Karatsiolis." 2007. http://d-nb.info/986026239/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Tsai, Lin-Pin, and 蔡林彬. "The related technologies about Certificate Revocation Lists of Public Key Infrastructure." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/95766000223976834048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Wang, Kuo-Lung, and 王國龍. "Authenticated Key Agreement Protocols with Public Key Certificates." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/02436737601198393426.

Full text
Abstract:
碩士<br>國立交通大學<br>電資學院學程碩士班<br>91<br>In June 1999, Seo and Sweeney proposed a simple authenticated key agreement protocol using a password-based method and modified Diffie-Hellman key agreement protocol to provide key authentication. In fact, the Seo-Sweeney protocol is still vulnerable to the reflective replay attack. From June 1999 to October 2000, there were three protocols proposed and they concentrated their attentions on the key validation phase to provide session key authentication. It seems too late to ensure the validation of the session key once the key establishment phase is attacked.
APA, Harvard, Vancouver, ISO, and other styles
36

Maity, Soumyadev. "Efficient Key Management, and Intrusion Detection Protocols for Enhancing Security in Mobile Ad Hoc Networks." Thesis, 2014. http://etd.iisc.ernet.in/handle/2005/2795.

Full text
Abstract:
Security of communications is a major requirement for Mobile Adhoc NETworks(MANETs) since they use wireless channel for communications which can be easily tapped, and physical capture of MANET nodes is also quite easy. From the point of view of providing security in MANETs, there are basically two types of MANETs, viz., authoritarian MANETs, in which there exist one or more authorities who decide the members of the network, and self-organized MANETs, in which there is no such authority. Ensuring security of communications in the MANETs is a challenging task due to the resource constraints and
APA, Harvard, Vancouver, ISO, and other styles
37

Lo, Chu Chen, and 羅菊珍. "Research on an electronic check system without using public-key certificates." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/90700207274447589598.

Full text
Abstract:
碩士<br>長庚大學<br>資訊管理研究所<br>94<br>As we have evidenced, electronic commerce has changed the way of conducting business transactions, in particular, the way of payment. Payment through the Internet, also known as on-line payment, has become common practices. In the past decade, a variety of schemes has been adopted for on-line payment including credit card, digital cash, wire transfer, etc. Among all the schemes, the electronic check is devised to replace the paper check, which is the most important form of payment in the traditional business world. The electronic check systems are all regulated
APA, Harvard, Vancouver, ISO, and other styles
38

Lin, Huei-Jeng, and 林惠徵. "A Study of Public Key Infrastructure - Using Attribute Certificates in Priviliege Management." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/44788744557754603673.

Full text
Abstract:
碩士<br>中國文化大學<br>資訊管理研究所<br>91<br>In recent years, more and more services are provided though network causing peo-ple depending on network more and more. Therefore, information security becomes an important issue in information system development. Public key infrastructure (PKI) solves the problem of authentication, however it doesn’t have good solution for problem of permission management of access control in information systems and proxy action for users. In 2000, ITU-T published 2000 version of X.509 to increase flexibility of using certificates. In that standard, certificates wer
APA, Harvard, Vancouver, ISO, and other styles
39

Rocha, Ivo Miguel da Silva. "A Mobile Secure Bluetooth-Enabled Cryptographic Provider." Master's thesis, 2019. http://hdl.handle.net/10362/92294.

Full text
Abstract:
The use of digital X509v3 public key certificates, together with different standards for secure digital signatures are commonly adopted to establish authentication proofs between principals, applications and services. One of the robustness characteristics commonly associated with such mechanisms is the need of hardware-sealed cryptographic devices, such as Hardware-Security Modules (or HSMs), smart cards or hardware-enabled tokens or dongles. These devices support internal functions for management and storage of cryptographic keys, allowing the isolated execution of cryptographic operati
APA, Harvard, Vancouver, ISO, and other styles
40

Rodrigues, Paulo Miguel Ramos. "Modelo de desenvolvimento e avaliação de infra-estruturas de chave pública." Master's thesis, 2005. http://hdl.handle.net/1822/26338.

Full text
Abstract:
Dissertação de mestrado em Sistema de Informação<br>Os computadores desempenham um papel muito importante na vida quotidiana. O número de computadores pessoais que são utilizados para negócio, entretenimento e educação, cresce dia após dia, e o crescente uso da Internet tem revolucionado completamente os modelos de negócio das organizações. Para manter a privacidade em canais de comunicação inseguros como a Internet, recorremos a ferramentas tais como: mecanismos de cifra e assinatura digital. A confidencialidade, idade e autenticidade dos dados armazenados e transferidos nas redes corp
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!