To see the other types of publications on this topic, follow the link: X.509 Certificates.

Dissertations / Theses on the topic 'X.509 Certificates'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 23 dissertations / theses for your research on the topic 'X.509 Certificates.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Asplund, Fredrik. "Parsing of X.509 certificates in a WAP environment." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1455.

Full text
Abstract:
<p>This master thesis consists of three parts. The first part contains a summary of what is needed to understand a X.509 parser that I have created, a discussion concerning the technical problems I encountered during the programming of this parser and a discussion concerning the final version of the parser. The second part concerns a comparison I made between the X.509 parser I created and a X.509 parser created"automatically"by a compiler. I tested static memory, allocation of memory during runtime and utilization of the CPU for both my parser (MP) and the parser that had a basic structure co
APA, Harvard, Vancouver, ISO, and other styles
2

Raghunathan, Subhashini. "A Security Model for Mobile Agents using X.509 Proxy Certificates." Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3320/.

Full text
Abstract:
Mobile agent technology presents an attractive alternative to the client-server paradigm for several network and real-time applications. However, for most applications, the lack of a viable agent security model has limited the adoption of the agent paradigm. This thesis presents a security model for mobile agents based on a security infrastructure for Computational Grids, and specifically, on X.509 Proxy Certificates. Proxy Certificates serve as credentials for Grid applications, and their primary purpose is temporary delegation of authority. Exploiting the similarity between Grid applications
APA, Harvard, Vancouver, ISO, and other styles
3

Bruhner, Carl Magnus, and Oscar Linnarsson. "Relay Racing with X.509 Mayflies : An Analysis of Certificate Replacements and Validity Periods in HTTPS Certificate Logs." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-167063.

Full text
Abstract:
Certificates are the foundation of secure communication over the internet as of today. While certificates can be issued with long validity periods, there is always a risk of having them compromised during their lifetime. A good practice is therefore to use shorter validity periods. However, this limits the certificate lifetime and gives less flexibility in the timing of certificate replacements. In this thesis, we use publicly available network logs from Rapid7's Project Sonar to provide an overview of the current state of certificate usage behavior. Specifically, we look at the Let's Encrypt
APA, Harvard, Vancouver, ISO, and other styles
4

Seeley, Nathaniel Allen. "Digital Receipts: A System to Detect the Compromise of Digital Certificates." BYU ScholarsArchive, 2006. https://scholarsarchive.byu.edu/etd/1108.

Full text
Abstract:
The ease of copying digital materials creates difficulty in detecting the theft of digital certificates. Uneducated users frequently fail to protect their digital certificate keys by not encrypting them, storing them in insecure places, and using them unwisely. In addition, there is no way to prove that protocols involving certificates are completely secure. This thesis introduces a system to ameliorate these problems by detecting the compromise of digital certificates. It leverages dual logging messages sent via side channels to a trusted third party. This third party correlates these message
APA, Harvard, Vancouver, ISO, and other styles
5

Klasson, Sebastian, and Nina Lindström. "Longitudinal analysis of the certificate chains of big tech company domains." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-178396.

Full text
Abstract:
The internet is one of the most widely used mediums for communication in modern society and it has become an everyday necessity for many. It is therefore of utmost importance that it remains as secure as possible. SSL and TLS are the backbones of internet security and an integral part of these technologies are the certificates used. Certificate authorities (CAs) can issue certificates that validate that domains are who they claim to be. If a user trusts a CA they can in turn also trust domains that have been validated by them. CAs can in turn trust other CAs and this, in turn, creates a chain
APA, Harvard, Vancouver, ISO, and other styles
6

Guilhen, Stefan Neusatz. "Um serviço de autorização Java EE baseado em certificados de atributos X.509." Universidade de São Paulo, 2008. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-03122008-164346/.

Full text
Abstract:
O surgimento e a popularização de arquiteturas de software que fornecem suporte à programação distribuída orientada a objetos, como CORBA, .NET e Java EE, gerou uma demanda por infra-estruturas de segurança eficientes, capazes de proteger os recursos dos sistemas de ataques maliciosos. Essa proteção começa pela identificação dos usuários que interagem com os sistemas, processo conhecido como autenticação. Entretanto, a autenticação por si só não é suficiente para garantir a segurança dos recursos, uma vez que a autenticação não determina quais ações os usuários estão autorizados a executar dep
APA, Harvard, Vancouver, ISO, and other styles
7

Dickinson, Luke Austin. "Certificate Revocation Table: Leveraging Locality of Reference in Web Requests to Improve TLS Certificate Revocation." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/7010.

Full text
Abstract:
X.509 certificate revocation defends against man-in-the-middle attacks involving a compromised certificate. Certificate revocation strategies face scalability, effectiveness, and deployment challenges as HTTPS adoption rates have soared. We propose Certificate Revocation Table (CRT), a new revocation strategy that is competitive with or exceeds alternative state-of-the-art solutions in effectiveness, efficiency, certificate growth scalability, mass revocation event scalability, revocation timeliness, privacy, and deployment requirements. The CRT periodically checks the revocation status of X.5
APA, Harvard, Vancouver, ISO, and other styles
8

Gustafsson, Josef. "Certificate Transparency in Theory and Practice." Thesis, Linköpings universitet, Databas och informationsteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-125855.

Full text
Abstract:
Certificate Transparency provides auditability to the widely used X.509 Public Key Infrastructure (PKIX) authentication in Transport Layer Security (TLS) protocol. Transparency logs issue signed promises of inclusions to be used together with certificates for authentication of TLS servers. Google Chrome enforces the use of Certificate Transparency for validation of Extended Validation (EV) certificates. This thesis proposes a methodology for asserting correct operation and presents a survey of active Logs. An experimental Monitor has been implemented as part of the thesis. Varying Log usage pa
APA, Harvard, Vancouver, ISO, and other styles
9

Herath, Mudiyanselage Udyani Shanika Kumari. "Next-generation web public-key infrastructure technologies." Thesis, Queensland University of Technology, 2019. https://eprints.qut.edu.au/128643/1/Udyani_Herath%20Mudiyanselage_Thesis.pdf.

Full text
Abstract:
This research is a study of public key infrastructure (PKI) technologies, present and future. It models a currently deployed PKI technology, designs a new technique by extending that model and lastly investigates the future aspects of public-key infrastructure. The work provides significant and broad knowledge on PKI trust models and technologies to enhance security and efficiency. The thesis examines Certificate Transparency and develops an abstract model of a logging scheme to capture its security properties, which is then extended using blockchain technology to cover distributed properties.
APA, Harvard, Vancouver, ISO, and other styles
10

Sjöström, Linus, and Carl Nykvist. "How Certificate Transparency Impact the Performance." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-140838.

Full text
Abstract:
Security on the Internet is essential to ensure the privacy of an individual. Today, Trans- port Layer Security (TLS) and certificates are used to ensure this. But certificates are not enough in order to maintain confidentiality and therefore a new concept, Certificate Trans- parency (CT), has been introduced. CT improves security by allowing the analysis of sus- picious certificates. Validation by CT uses public logs that can return Signed Certificate Timestamp (SCT), which is a promise returned by the log indicating that the certificate will be added to the log. A server may then deliver the
APA, Harvard, Vancouver, ISO, and other styles
11

Hassan, Yusuf. "Migration of Signing Algorithms : An investigation in migration of signing algorithms used in certificate authorities." Thesis, KTH, Hälsoinformatik och logistik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-252762.

Full text
Abstract:
The migration of signing algorithms is a process which can be used to move from signing algorithms which are regarded as less safe to algorithms which are regarded as safer. The safety of cryptographic algorithms has been compromised before, algorithms such as SHA-1 has been proven to be broken. The goal of this study was to find criteria that could define a successful migration as well as evaluating a method to perform a migration. The criteria were found by evaluating related works found in an RFC document as well as in a Springer conference paper. The criteria that was found was the followi
APA, Harvard, Vancouver, ISO, and other styles
12

Hauserová, Markéta. "Elektronické zabezpečení zdravotnické dokumentace v prostředí zdravotnického IS." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236445.

Full text
Abstract:
Thesis is analyzing czech laws which are related to medical documentation. Describes the points  which are mandatory for information system, so the medical documentation can be stored electronically. Includes various algorithms for implementation of certain electronic signature and for  identification of person. This thesis deals with asymmetric cryptography, specifically RSA, DSA, and ECDSA. Describes the hash functions and their functions and their characteristics. Describes the principle of the certificate, ways of its obtaining, invalidation and their formats. Analyzes medical information
APA, Harvard, Vancouver, ISO, and other styles
13

Muñoz, Tapia José L. (José Luis). "Desing and Evaluation of Certificate Revocation Systems." Doctoral thesis, Universitat Politècnica de Catalunya, 2003. http://hdl.handle.net/10803/7031.

Full text
Abstract:
Este trabajo presenta tanto el estado del arte como un análisis de los principales sistemas de revocación de certificados digitales. El hecho de comprender bien el mecanismo de revocación de un certificado es importante tanto para los proveedores de servicios PKI como para los usuarios finales de la PKI: una mejor comprensión de las complejidades del sistema de revocación permite a estas entidades mejorar su proceso de decisión a la hora de aceptar o rechazar un certificado teniendo en cuenta la gran cantidad de variables inherentes en los sistemas de revocación. <br/>La revocación de certific
APA, Harvard, Vancouver, ISO, and other styles
14

DEMERJIAN, JACQUES. "Services d'autorisation et Intégration au protocole d'attribution dynamique des adresses." Phd thesis, Télécom ParisTech, 2004. http://tel.archives-ouvertes.fr/tel-00010042.

Full text
Abstract:
La sécurité est un enjeu majeur des technologies numériques modernes. Avec le développement de l'Internet, les besoins de sécurité sont de plus en plus importants. Le développement d'applications Internet telles que le commerce électronique, les applications médicales ou la vidéoconférence, implique de nouveaux besoins comme, l'identification des entités communicantes, l'intégrité des messages échangés, la confidentialité de la transaction, l'authentification des entités, l'anonymat du propriétaire du certificat, l'habilitation des droits, la procuration, etc..<br /><br />Qu'il s'agisse de don
APA, Harvard, Vancouver, ISO, and other styles
15

Engström, Pontus. "Modernizing forms at KTH : Using Digital Signatures." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-193898.

Full text
Abstract:
Today both government agencies and companies struggle to keep up with the pace of the continuous change of technology. With all new technology there are benefits, but new problems might also occur. Implementing new technology for certain tasks may increase both efficiency and security, resulting in a more sustainable work environment. One technology that is increasingly adopted is digital signatures. Instead of using classical handwritten signatures on documents, a digital signature can be more time efficient and have higher security. In order to implement a digital signature technology some s
APA, Harvard, Vancouver, ISO, and other styles
16

Wazan, Ahmad Samer. "Gestion de la confiance dans les infrastructures à clés publiques." Toulouse 3, 2011. http://thesesups.ups-tlse.fr/1450/.

Full text
Abstract:
Aujourd'hui, l'Internet est le plus large réseau dans le monde. Support dès l'origine des échanges entre chercheurs et académiciens, les facultés qu'il offre ont séduit dans nombre de secteurs et aujourd'hui il demeure le support privilégié des usages nouveaux. Il permet d'établir des collaborations, il est le support de nombre d'interactions que ce soit dans un domaine cognitif social ou de business au sens large et au services d'usagers équipés de terminaux variés, en s'affranchissant des contraintes spatiales et temporelles. L'Internet est devenu une communauté universelle, où la volonté d'
APA, Harvard, Vancouver, ISO, and other styles
17

Lozda, Marius. "Elektroninio parašo atributų sertifikavimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2011~D_20140627_165731-47089.

Full text
Abstract:
Darbe nagrinėjama atributinės informacijos sertifikavimo šiuo metu naudojamuose elektroniniuse parašuose problema. Trumpai apžvelgiami elektroninio parašo principai ir supažindinama su viešųjų raktų infrastruktūra, nurodant galimybes jai išplėsti, iškilus poreikiui užtikrinti aukštesnį saugumo lygį keičiantis papildoma (atributine) informacija. Nagrinėjami įvairūs atributinės informacijos sertifikavimo metodai, viešųjų raktų infrastruktūroje įvedant atributų sertifikato ir atributų sertifikavimo centro sąvokas. Pateikiamas tinkamiausio metodo pritaikymo pavyzdys, modeliuojant elektroninio para
APA, Harvard, Vancouver, ISO, and other styles
18

Frausto, Bernal Paul Axayacatl. "ICARE-S2 : Infrastructure de confiance sur des architectures de réseaux pour les services de signature évoluée." Phd thesis, Télécom ParisTech, 2004. http://pastel.archives-ouvertes.fr/pastel-00000924.

Full text
Abstract:
Actuellement, de plus en plus d'ordinateurs sont interconnectés à l'Internet ou à des réseaux locaux. Il est donc indispensable de partager et de protéger l'information de façon performante. Pour accélérer et favoriser le développement de nouvelles applications et services autour des transactions électroniques, la sécurité devient une priorité. L'infrastructure de gestion de clés (IGC) est une réponse conçue pour assurer la sécurité des transactions électroniques et permettre l'échange de renseignements sensibles entre des parties qui n'ont pas établi au préalable de liens. La signature électr
APA, Harvard, Vancouver, ISO, and other styles
19

Hořejš, Jan. "Anonymní pohyb v síti internet." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220609.

Full text
Abstract:
The objective of this master’s thesis was to describe current capabilities of anonymous browsing over the Internet. The theoretical part focuses on three main methods of anonymization with main focus on Tor network. The master‘s thesis describes advantages and disadvantages of different solutions and possible attacks on them. In the next part is demonstrated Tor network, implementation of Hidden service and secured access to the server for clients and possible attacks against this proposal. The work also includes the results of measurements of all three anonymizers and the effects on their spe
APA, Harvard, Vancouver, ISO, and other styles
20

Miranda, César Davide Barbosa. "Large scale secure automatic provisioning of X.509 certificates via web services." Master's thesis, 2015. https://repositorio-aberto.up.pt/handle/10216/82514.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Miranda, César Davide Barbosa. "Large scale secure automatic provisioning of X.509 certificates via web services." Dissertação, 2015. https://repositorio-aberto.up.pt/handle/10216/82514.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Costa, Mário Simão Dias. "Reducing fraud in authentication systems using attribute certificates." Master's thesis, 2017. http://hdl.handle.net/1822/49535.

Full text
Abstract:
Dissertação de mestrado integrado em Telecommunications and Informatics Engineering<br>With sophisticate ways to forge authentication systems such as ticketing, there is a growing interest in a way to reduce fraud in these systems. To do so, attribute certificate’s technology will be used, more specifically, in a scheme where will be employed QR code to support its transport, to share and to present the attribute certificate for better identification so that a user has a harder task when trying to forge its identity. The proposed solution will make authentication systems more secure; validati
APA, Harvard, Vancouver, ISO, and other styles
23

Smolík, Jiří. "Důvěryhodná proxy v SSL/TLS spojení." Master's thesis, 2017. http://www.nusl.cz/ntk/nusl-264815.

Full text
Abstract:
The problem of SSL/TLS interception ("trusted proxy in SSL/TLS connection") has been known for years and many implementations exist. However, all of them share a single technical solution which is based solely on the PKI authentication mechanism and suffers from multiple serious disadvantages. Most importantly, it is not compatible with several aspects or future trends of SSL/TLS and PKI, there's almost no space for improvement and its real use may spawn legal issues. After we analyze technical background and the current solution, we will propose another one, based not only on PKI but SSL/TLS
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!