Academic literature on the topic 'X.509 Certificates'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'X.509 Certificates.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "X.509 Certificates"

1

Mardianto, Is, and Kuswandi Kuswandi. "Implementasi Keamanan pada Transaksi Data Menggunakan Sertifikat Digital X.509." Jurnal ULTIMATICS 8, no. 1 (2017): 1–10. http://dx.doi.org/10.31937/ti.v8i1.496.

Full text
Abstract:
Security issues have become a major issue on the Internet. One of the security methods that are widely used today is to implement a digital certificate. Digital certificates have evolved over time, one of which is the X.509 digital certificate. Digital certificates have been widely used as authentication applications, web network authentication and other authentication systems that require digital certificates. This research is carried out by implementing an X.509 digital certificate technology as a mobile web service with its client. Secure Hash Algorithm (SHA), Diffie-Hellman, and Advanced E
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Jizhi. "The Prediction of Serial Number in OpenSSL’s X.509 Certificate." Security and Communication Networks 2019 (May 2, 2019): 1–11. http://dx.doi.org/10.1155/2019/6013846.

Full text
Abstract:
In 2007, a real faked X.509 certificate based on the chosen-prefix collision of MD5 was presented by Marc Stevens. In the method, attackers needed to predict the serial number of X.509 certificates generated by CAs besides constructing the collision pairs of MD5. After that, the randomness of the serial number is required. Then, in this case, how do we predict the random serial number? Thus, the way of generating serial number in OpenSSL was reviewed. The vulnerability was found that the value of the field “not before” of X.509 certificates generated by OpenSSL leaked the generating time of th
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Jiaxin, Zhaoxin Zhang, and Changyong Guo. "Machine Learning-Based Malicious X.509 Certificates’ Detection." Applied Sciences 11, no. 5 (2021): 2164. http://dx.doi.org/10.3390/app11052164.

Full text
Abstract:
X.509 certificates play an important role in encrypting the transmission of data on both sides under HTTPS. With the popularization of X.509 certificates, more and more criminals leverage certificates to prevent their communications from being exposed by malicious traffic analysis tools. Phishing sites and malware are good examples. Those X.509 certificates found in phishing sites or malware are called malicious X.509 certificates. This paper applies different machine learning models, including classical machine learning models, ensemble learning models, and deep learning models, to distinguis
APA, Harvard, Vancouver, ISO, and other styles
4

Hawanna, Varsharani, V. Y. Kulkarni, R. A. Rane, P. Mestri, and S. Panchal. "Risk Rating System of X.509 Certificates." Procedia Computer Science 89 (2016): 152–61. http://dx.doi.org/10.1016/j.procs.2016.06.027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kwon, Taekyoung. "Privacy preservation with X.509 standard certificates." Information Sciences 181, no. 13 (2011): 2906–21. http://dx.doi.org/10.1016/j.ins.2011.02.016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dmitruk, Joanna, and Michał Glet. "Analysis of theoretical security level of PDF Encryption mechanism based on X.509 certificates." Bulletin of the Military University of Technology 66, no. 4 (2017): 95–110. http://dx.doi.org/10.5604/01.3001.0010.8221.

Full text
Abstract:
PDF Encryption is a content security mechanism developed and used by Adobe in their products. In this paper, we have checked a theoretical security level of a variant that uses public key infrastructure and X.509 certificates. We have described a basis of this mechanism and we have performed a simple security analysis. Then, we have showed possible tweaks and security improvements. At the end, we have given some recommendations that can improve security of a content secured with PDF Encryption based on X.509 certificates. Keywords: DRM, cryptography, security level, PDF Encryption, Adobe, X.50
APA, Harvard, Vancouver, ISO, and other styles
7

Chadwick, D. W., A. Otenko, and E. Ball. "Role-based access control with X.509 attribute certificates." IEEE Internet Computing 7, no. 2 (2003): 62–69. http://dx.doi.org/10.1109/mic.2003.1189190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bindel, Nina, Johannes Braun, Luca Gladiator, Tobias Stöckert, and Johannes Wirth. "X.509-Compliant Hybrid Certificates for the Post-Quantum Transition." Journal of Open Source Software 4, no. 40 (2019): 1606. http://dx.doi.org/10.21105/joss.01606.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wazan, Ahmad Samer, Romain Laborde, David W. Chadwick, et al. "Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker." Security and Communication Networks 2017 (2017): 1–23. http://dx.doi.org/10.1155/2017/6907146.

Full text
Abstract:
A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propagate trust in authentication over the Internet. This technology is based on a trust model defined by the original X.509 (1988) standard and is composed of three entities: the certification authority (CA), the certificate holder (or subject), and the Relying Party (RP). The CA plays the role of a trusted third party between the certificate holder and the RP. In many use cases, this trust model has worked successfully. However, we argue that the application of this model on the Internet implies that
APA, Harvard, Vancouver, ISO, and other styles
10

Ravikanth Reddy Gudipati. "Public key infrastructure: The cornerstone of modern authentication and authorization." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 1857–63. https://doi.org/10.30574/wjarr.2025.26.1.1220.

Full text
Abstract:
Public Key Infrastructure (PKI) is the cornerstone of modern digital security, providing essential mechanisms for authentication and authorization across diverse technological landscapes. With the rising complexity of digital environments and the increasing adoption of cloud services, IoT devices, and Zero Trust architectures, PKI has evolved to meet emerging security challenges. The implementation of PKI encompasses crucial components, including public-private key pairs, certificate authorities, and X.509 certificates, which enable secure communication, identity verification, and access contr
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "X.509 Certificates"

1

Asplund, Fredrik. "Parsing of X.509 certificates in a WAP environment." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1455.

Full text
Abstract:
<p>This master thesis consists of three parts. The first part contains a summary of what is needed to understand a X.509 parser that I have created, a discussion concerning the technical problems I encountered during the programming of this parser and a discussion concerning the final version of the parser. The second part concerns a comparison I made between the X.509 parser I created and a X.509 parser created"automatically"by a compiler. I tested static memory, allocation of memory during runtime and utilization of the CPU for both my parser (MP) and the parser that had a basic structure co
APA, Harvard, Vancouver, ISO, and other styles
2

Raghunathan, Subhashini. "A Security Model for Mobile Agents using X.509 Proxy Certificates." Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3320/.

Full text
Abstract:
Mobile agent technology presents an attractive alternative to the client-server paradigm for several network and real-time applications. However, for most applications, the lack of a viable agent security model has limited the adoption of the agent paradigm. This thesis presents a security model for mobile agents based on a security infrastructure for Computational Grids, and specifically, on X.509 Proxy Certificates. Proxy Certificates serve as credentials for Grid applications, and their primary purpose is temporary delegation of authority. Exploiting the similarity between Grid applications
APA, Harvard, Vancouver, ISO, and other styles
3

Bruhner, Carl Magnus, and Oscar Linnarsson. "Relay Racing with X.509 Mayflies : An Analysis of Certificate Replacements and Validity Periods in HTTPS Certificate Logs." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-167063.

Full text
Abstract:
Certificates are the foundation of secure communication over the internet as of today. While certificates can be issued with long validity periods, there is always a risk of having them compromised during their lifetime. A good practice is therefore to use shorter validity periods. However, this limits the certificate lifetime and gives less flexibility in the timing of certificate replacements. In this thesis, we use publicly available network logs from Rapid7's Project Sonar to provide an overview of the current state of certificate usage behavior. Specifically, we look at the Let's Encrypt
APA, Harvard, Vancouver, ISO, and other styles
4

Seeley, Nathaniel Allen. "Digital Receipts: A System to Detect the Compromise of Digital Certificates." BYU ScholarsArchive, 2006. https://scholarsarchive.byu.edu/etd/1108.

Full text
Abstract:
The ease of copying digital materials creates difficulty in detecting the theft of digital certificates. Uneducated users frequently fail to protect their digital certificate keys by not encrypting them, storing them in insecure places, and using them unwisely. In addition, there is no way to prove that protocols involving certificates are completely secure. This thesis introduces a system to ameliorate these problems by detecting the compromise of digital certificates. It leverages dual logging messages sent via side channels to a trusted third party. This third party correlates these message
APA, Harvard, Vancouver, ISO, and other styles
5

Klasson, Sebastian, and Nina Lindström. "Longitudinal analysis of the certificate chains of big tech company domains." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-178396.

Full text
Abstract:
The internet is one of the most widely used mediums for communication in modern society and it has become an everyday necessity for many. It is therefore of utmost importance that it remains as secure as possible. SSL and TLS are the backbones of internet security and an integral part of these technologies are the certificates used. Certificate authorities (CAs) can issue certificates that validate that domains are who they claim to be. If a user trusts a CA they can in turn also trust domains that have been validated by them. CAs can in turn trust other CAs and this, in turn, creates a chain
APA, Harvard, Vancouver, ISO, and other styles
6

Guilhen, Stefan Neusatz. "Um serviço de autorização Java EE baseado em certificados de atributos X.509." Universidade de São Paulo, 2008. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-03122008-164346/.

Full text
Abstract:
O surgimento e a popularização de arquiteturas de software que fornecem suporte à programação distribuída orientada a objetos, como CORBA, .NET e Java EE, gerou uma demanda por infra-estruturas de segurança eficientes, capazes de proteger os recursos dos sistemas de ataques maliciosos. Essa proteção começa pela identificação dos usuários que interagem com os sistemas, processo conhecido como autenticação. Entretanto, a autenticação por si só não é suficiente para garantir a segurança dos recursos, uma vez que a autenticação não determina quais ações os usuários estão autorizados a executar dep
APA, Harvard, Vancouver, ISO, and other styles
7

Dickinson, Luke Austin. "Certificate Revocation Table: Leveraging Locality of Reference in Web Requests to Improve TLS Certificate Revocation." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/7010.

Full text
Abstract:
X.509 certificate revocation defends against man-in-the-middle attacks involving a compromised certificate. Certificate revocation strategies face scalability, effectiveness, and deployment challenges as HTTPS adoption rates have soared. We propose Certificate Revocation Table (CRT), a new revocation strategy that is competitive with or exceeds alternative state-of-the-art solutions in effectiveness, efficiency, certificate growth scalability, mass revocation event scalability, revocation timeliness, privacy, and deployment requirements. The CRT periodically checks the revocation status of X.5
APA, Harvard, Vancouver, ISO, and other styles
8

Gustafsson, Josef. "Certificate Transparency in Theory and Practice." Thesis, Linköpings universitet, Databas och informationsteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-125855.

Full text
Abstract:
Certificate Transparency provides auditability to the widely used X.509 Public Key Infrastructure (PKIX) authentication in Transport Layer Security (TLS) protocol. Transparency logs issue signed promises of inclusions to be used together with certificates for authentication of TLS servers. Google Chrome enforces the use of Certificate Transparency for validation of Extended Validation (EV) certificates. This thesis proposes a methodology for asserting correct operation and presents a survey of active Logs. An experimental Monitor has been implemented as part of the thesis. Varying Log usage pa
APA, Harvard, Vancouver, ISO, and other styles
9

Herath, Mudiyanselage Udyani Shanika Kumari. "Next-generation web public-key infrastructure technologies." Thesis, Queensland University of Technology, 2019. https://eprints.qut.edu.au/128643/1/Udyani_Herath%20Mudiyanselage_Thesis.pdf.

Full text
Abstract:
This research is a study of public key infrastructure (PKI) technologies, present and future. It models a currently deployed PKI technology, designs a new technique by extending that model and lastly investigates the future aspects of public-key infrastructure. The work provides significant and broad knowledge on PKI trust models and technologies to enhance security and efficiency. The thesis examines Certificate Transparency and develops an abstract model of a logging scheme to capture its security properties, which is then extended using blockchain technology to cover distributed properties.
APA, Harvard, Vancouver, ISO, and other styles
10

Sjöström, Linus, and Carl Nykvist. "How Certificate Transparency Impact the Performance." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-140838.

Full text
Abstract:
Security on the Internet is essential to ensure the privacy of an individual. Today, Trans- port Layer Security (TLS) and certificates are used to ensure this. But certificates are not enough in order to maintain confidentiality and therefore a new concept, Certificate Trans- parency (CT), has been introduced. CT improves security by allowing the analysis of sus- picious certificates. Validation by CT uses public logs that can return Signed Certificate Timestamp (SCT), which is a promise returned by the log indicating that the certificate will be added to the log. A server may then deliver the
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "X.509 Certificates"

1

Nyström, Magnus, and John Brainard. "An X.509-Compatible Syntax for Compact Certificates." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-46701-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shin, Dongwan, Gail-Joon Ahn, and Sangrae Cho. "Using X.509 Attribute Certificates for Role-Based EAM." In Research Directions in Data and Applications Security. Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35697-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Drogkaris, Prokopios, and Stefanos Gritzalis. "Attaching Multiple Personal Identifiers in X.509 Digital Certificates." In Public Key Infrastructures, Services and Applications. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22633-5_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Barenghi, Alessandro, Nicholas Mainardi, and Gerardo Pelosi. "A Novel Regular Format for X.509 Digital Certificates." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54978-1_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Forsby, Filip, Martin Furuhed, Panos Papadimitratos, and Shahid Raza. "Lightweight X.509 Digital Certificates for the Internet of Things." In Interoperability, Safety and Security in IoT. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93797-7_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hawanna, Varsharani, Vrushali Kulkarni, Rashmi Rane, and Pooja Joshi. "Risk Evaluation of X.509 Certificates – A Machine Learning Application." In Information Systems Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49806-5_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Patil, Vishwas, Paolo Gasti, Luigi Mancini, and Giovanni Chiola. "Resource Management with X.509 Inter-domain Authorization Certificates (InterAC)." In Public Key Infrastructures, Services and Applications. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16441-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Stevens, Marc, Arjen Lenstra, and Benne de Weger. "Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities." In Advances in Cryptology - EUROCRYPT 2007. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-72540-4_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Morales, David A. Cordova, Ahmad Samer Wazan, David W. Chadwick, Romain Laborde, April Rains Reyes Maramara, and Kalil Cabral. "Enhancing the ACME Protocol to Automate the Management of All X.509 Web Certificates." In ICT Systems Security and Privacy Protection. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-56326-3_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gergely, Adam Mihai, and Bogdan Crainicu. "BlockCACert – A Blockchain-Based Novel Concept for Automatic Deployment of X.509 Digital Certificates." In The 15th International Conference Interdisciplinarity in Engineering. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93817-8_73.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "X.509 Certificates"

1

Orlando, Simone, Alessandro Barenghi, and Gerardo Pelosi. "Investigating the Health State of X.509 Digital Certificates." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679412.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Debnath, Joyanta, Christa Jenkins, Yuteng Sun, Sze Yiu Chau, and Omar Chowdhury. "ARMOR: A Formally Verified Implementation of X.509 Certificate Chain Validation." In 2024 IEEE Symposium on Security and Privacy (SP). IEEE, 2024. http://dx.doi.org/10.1109/sp54263.2024.00220.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Berbecaru, Diana Gratiela, Silvia Sisinni, and Matteo Simone. "On the evaluation of X.509 certificate processing in Transport Layer Security interceptors." In 2024 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2024. http://dx.doi.org/10.1109/iscc61673.2024.10733685.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bauer, Christian. "X.509 identity certificates with local verification." In ICC 2012 - 2012 IEEE International Conference on Communications. IEEE, 2012. http://dx.doi.org/10.1109/icc.2012.6364723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Quiroz, Erik Papa, Alvaro Cuno, Wilber Ramos Lovon, and Ever Cruzado. "ECC usage on X.509 digital certificates." In 2020 IEEE Engineering International Research Conference (EIRCON). IEEE, 2020. http://dx.doi.org/10.1109/eircon51178.2020.9254050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wazan, Ahmad Samer, Romain Laborde, François Barrère, and Abdelmalek Benzekri. "Validating X.509 Certificates Based on their Quality." In 2008 9th International Conference for Young Computer Scientists (ICYCS). IEEE, 2008. http://dx.doi.org/10.1109/icycs.2008.75.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Martinez, Ronald, Alain Alejo, Paulo Portugal, Alvaro Cuno, Fernando Zapata, and Ricardo Saavedra. "An artifact for X.509 digital certificates delivery." In 2019 38th International Conference of the Chilean Computer Science Society (SCCC). IEEE, 2019. http://dx.doi.org/10.1109/sccc49216.2019.8966448.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Uahhabi, Zakia El, and Hanan El Bakkali. "An approach for evaluating trust in X.509 certificates." In 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2016. http://dx.doi.org/10.1109/icitst.2016.7856696.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Chao, Donggang Yang, Chu Chen, and Pinghong Ren. "Checking Compliance of X.509 Digital Certificates over IPv6 with Specifications." In CIAT 2020: 2020 International Conference on Cyberspace Innovation of Advanced Technologies. ACM, 2020. http://dx.doi.org/10.1145/3444370.3444611.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Friedl, Thomas, Henning Schneider, and Miloslava Plachkinova. "Development of a Platform-Independent Software Tool for Management of X.509 Certificates from Diverse Certificate Stores." In 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech). IEEE, 2017. http://dx.doi.org/10.1109/dasc-picom-datacom-cyberscitec.2017.57.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "X.509 Certificates"

1

Santesson, S., R. Housley, and T. Freeman. Internet X.509 Public Key Infrastructure: Logotypes in X.509 Certificates. RFC Editor, 2004. http://dx.doi.org/10.17487/rfc3709.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Santesson, S., R. Housley, T. Freeman, and L. Rosenthol. Internet X.509 Public Key Infrastructure: Logotypes in X.509 Certificates. RFC Editor, 2023. http://dx.doi.org/10.17487/rfc9399.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Melnikov, A., and W. Chuang, eds. Internationalized Email Addresses in X.509 Certificates. RFC Editor, 2018. http://dx.doi.org/10.17487/rfc8398.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Melnikov, A., W. Chuang, and C. Bonnell. Internationalized Email Addresses in X.509 Certificates. RFC Editor, 2024. http://dx.doi.org/10.17487/rfc9598.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Huston, G., G. Michaelson, and R. Loomans. A Profile for X.509 PKIX Resource Certificates. RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6487.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Santesson, S., W. Polk, P. Barzin, and M. Nystrom. Internet X.509 Public Key Infrastructure Qualified Certificates Profile. RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Santesson, S., M. Nystrom, and T. Polk. Internet X.509 Public Key Infrastructure: Qualified Certificates Profile. RFC Editor, 2004. http://dx.doi.org/10.17487/rfc3739.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Housley, R., T. Okubo, and J. Mandel. No Revocation Available for X.509 Public Key Certificates. RFC Editor, 2024. http://dx.doi.org/10.17487/rfc9608.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zeilenga, K. Lightweight Directory Access Protocol (LDAP) Schema Definitions for X.509 Certificates. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4523.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lawrence, S., and V. Gurbani. Extended Key Usage (EKU) for Session Initiation Protocol (SIP) X.509 Certificates. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!