Journal articles on the topic 'X.509 Certificates'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'X.509 Certificates.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mardianto, Is, and Kuswandi Kuswandi. "Implementasi Keamanan pada Transaksi Data Menggunakan Sertifikat Digital X.509." Jurnal ULTIMATICS 8, no. 1 (2017): 1–10. http://dx.doi.org/10.31937/ti.v8i1.496.
Full textWang, Jizhi. "The Prediction of Serial Number in OpenSSL’s X.509 Certificate." Security and Communication Networks 2019 (May 2, 2019): 1–11. http://dx.doi.org/10.1155/2019/6013846.
Full textLi, Jiaxin, Zhaoxin Zhang, and Changyong Guo. "Machine Learning-Based Malicious X.509 Certificates’ Detection." Applied Sciences 11, no. 5 (2021): 2164. http://dx.doi.org/10.3390/app11052164.
Full textHawanna, Varsharani, V. Y. Kulkarni, R. A. Rane, P. Mestri, and S. Panchal. "Risk Rating System of X.509 Certificates." Procedia Computer Science 89 (2016): 152–61. http://dx.doi.org/10.1016/j.procs.2016.06.027.
Full textKwon, Taekyoung. "Privacy preservation with X.509 standard certificates." Information Sciences 181, no. 13 (2011): 2906–21. http://dx.doi.org/10.1016/j.ins.2011.02.016.
Full textDmitruk, Joanna, and Michał Glet. "Analysis of theoretical security level of PDF Encryption mechanism based on X.509 certificates." Bulletin of the Military University of Technology 66, no. 4 (2017): 95–110. http://dx.doi.org/10.5604/01.3001.0010.8221.
Full textChadwick, D. W., A. Otenko, and E. Ball. "Role-based access control with X.509 attribute certificates." IEEE Internet Computing 7, no. 2 (2003): 62–69. http://dx.doi.org/10.1109/mic.2003.1189190.
Full textBindel, Nina, Johannes Braun, Luca Gladiator, Tobias Stöckert, and Johannes Wirth. "X.509-Compliant Hybrid Certificates for the Post-Quantum Transition." Journal of Open Source Software 4, no. 40 (2019): 1606. http://dx.doi.org/10.21105/joss.01606.
Full textWazan, Ahmad Samer, Romain Laborde, David W. Chadwick, et al. "Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker." Security and Communication Networks 2017 (2017): 1–23. http://dx.doi.org/10.1155/2017/6907146.
Full textRavikanth Reddy Gudipati. "Public key infrastructure: The cornerstone of modern authentication and authorization." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 1857–63. https://doi.org/10.30574/wjarr.2025.26.1.1220.
Full textH, Sowmyashree, and Sharmila K.P. "Achieving Security and Data Privacy for VANET using X.509 Certificates." IJARCCE 4, no. 5 (2015): 701–6. http://dx.doi.org/10.17148/ijarcce.2015.45147.
Full textLippert, M., V. Karatsiolis, A. Wiesmaier, and J. Buchmann. "Life-cycle management of X.509 certificates based on LDAP directories." Journal of Computer Security 14, no. 5 (2006): 419–39. http://dx.doi.org/10.3233/jcs-2006-14503.
Full textSun, Yuteng, Joyanta Debnath, Wenzheng Hong, Omar Chowdhury, and Sze Yiu Chau. "On the Unnecessary Complexity of Names in X.509 and Their Impact on Implementations." Proceedings of the ACM on Software Engineering 2, FSE (2025): 1454–74. https://doi.org/10.1145/3715785.
Full textCeccanti, Andrea, Enrico Vianello, Marco Caberletti, and Francesco Giacomini. "Beyond X.509: token-based authentication and authorization for HEP." EPJ Web of Conferences 214 (2019): 09002. http://dx.doi.org/10.1051/epjconf/201921409002.
Full textTalamo, Maurizio, Franco Arcieri, Andrea Dimitri, and Christian H. Schunck. "A Blockchain based PKI Validation System based on Rare Events Management." Future Internet 12, no. 2 (2020): 40. http://dx.doi.org/10.3390/fi12020040.
Full textAhamad, Shaik Shakeel, V. N. Sastry, and Siba K. Udgata. "Secure and Optimized Mobile Based Merchant Payment Protocol using Signcryption." International Journal of Information Security and Privacy 6, no. 2 (2012): 64–94. http://dx.doi.org/10.4018/jisp.2012040105.
Full textMuftic, Sead. "BIX Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger." Ledger 1 (December 21, 2016): 19–37. http://dx.doi.org/10.5195/ledger.2016.27.
Full textBockelman, Brian, Andrea Ceccanti, Ian Collier, et al. "WLCG Authorisation from X.509 to Tokens." EPJ Web of Conferences 245 (2020): 03001. http://dx.doi.org/10.1051/epjconf/202024503001.
Full textRaghunathan, Subhashini, Armin R. Mikler, and Cliff Cozzolino. "Secure agent computation: X.509 Proxy Certificates in a multi-lingual agent framework." Journal of Systems and Software 75, no. 1-2 (2005): 125–37. http://dx.doi.org/10.1016/j.jss.2004.01.008.
Full textCiaschini, Vincenzo, Lucia Morganti, Matteo Tenti, and Carmelo Pellegrino. "Dataclient: a simple interface for scientific data transfers hiding x.509 complexities." EPJ Web of Conferences 214 (2019): 04003. http://dx.doi.org/10.1051/epjconf/201921404003.
Full textBauer, Daniela, David Colling, Simon Fayer, Janusz Martyniak, and Alexander Richards. "An open source data transfer tool kit for research data." EPJ Web of Conferences 214 (2019): 04039. http://dx.doi.org/10.1051/epjconf/201921404039.
Full textSrinivas Kolluri. "Unified Identity Management in the Cloud: SAP IAS Integration with SAP BTP." Journal of Computer Science and Technology Studies 7, no. 5 (2025): 662–70. https://doi.org/10.32996/jcsts.2025.7.5.73.
Full textEl Mane, Adil, Younes Chihab, and Redouan Korchiyne. "Digital Signature for data and documents using operating PKI certificates." SHS Web of Conferences 119 (2021): 07004. http://dx.doi.org/10.1051/shsconf/202111907004.
Full textKwon, Hyunsoo. "Secure and Scalable Device Attestation Protocol with Aggregate Signature." Symmetry 17, no. 5 (2025): 698. https://doi.org/10.3390/sym17050698.
Full textSandhya, Guduru. "Zero Trust Automation: SPIFFE/SPIRE for Identity Federation and OpenZiti in Microsegmented Networks." European Journal of Advances in Engineering and Technology 8, no. 10 (2021): 122–26. https://doi.org/10.5281/zenodo.15387226.
Full textKamola, Mariusz. "Internet of Things with Lightweight Identities Implemented Using DNS DANE—Architecture Proposal." Sensors 18, no. 8 (2018): 2517. http://dx.doi.org/10.3390/s18082517.
Full textNgoc, Luong Thai, and Vo Thanh Tu. "A DIGITAL CERTIFICATION MANAGEMENT MECHANISMS AND SECURITY ROUTING PROTOCOL IN MOBILE AD HOC NETWORK." Journal of Computer Science and Cybernetics 34, no. 3 (2018): 199–217. http://dx.doi.org/10.15625/1813-9663/34/3/12259.
Full textGergely, Adam Mihai, and Bogdan Crainicu. "The Concept of a Distributed Repository for Validating X.509 Attribute Certificates in a Privilege Management Infrastructure." Procedia Technology 22 (2016): 926–30. http://dx.doi.org/10.1016/j.protcy.2016.01.087.
Full textWirtgen, Thomas, Nicolas Rybowski, Cristel Pelsser, and Olivier Bonaventure. "The Multiple Benefits of a Secure Transport for BGP." Proceedings of the ACM on Networking 2, CoNEXT4 (2024): 1–23. http://dx.doi.org/10.1145/3696406.
Full textMartinez Pedreira, Miguel, Costin Grigoras, Volodymyr Yurchenko, and Maksim Melnik Storetvedt. "The Security model of the ALICE next generation Grid framework." EPJ Web of Conferences 214 (2019): 03042. http://dx.doi.org/10.1051/epjconf/201921403042.
Full textChia, Jason, Swee-Huay Heng, Ji-Jian Chin, Syh-Yuan Tan, and Wei-Chuen Yau. "An Implementation Suite for a Hybrid Public Key Infrastructure." Symmetry 13, no. 8 (2021): 1535. http://dx.doi.org/10.3390/sym13081535.
Full textHermawan, Wawan. "Single Sign On Using Keycloak Integrated Public Key Infrastructure for User Authentication In Indonesia’s Electronic Based Government System." Advance Sustainable Science Engineering and Technology 5, no. 2 (2023): 0230204. http://dx.doi.org/10.26877/asset.v5i2.15795.
Full textDossett, David, and Martin Sevior. "Prompt calibration automation at Belle II." EPJ Web of Conferences 245 (2020): 02016. http://dx.doi.org/10.1051/epjconf/202024502016.
Full textSharma, Giriraj, Amit M. Joshi, and Saraju P. Mohanty. "Fortified-Grid: Fortifying Smart Grids through the Integration of the Trusted Platform Module in Internet of Things Devices." Information 14, no. 9 (2023): 491. http://dx.doi.org/10.3390/info14090491.
Full textMambelli, Marco, Bruno Coimbra, and Dennis Box. "Transitioning GlideinWMS, a multi domain distributed workload manager, from GSI proxies to tokens and other granular credentials." EPJ Web of Conferences 295 (2024): 04051. http://dx.doi.org/10.1051/epjconf/202429504051.
Full textLapshichyov, Vitaly, and Oleg Makarevich. "Method for Detecting and Identification of Tor Network Data by Wireshark Analyzer." Voprosy kiberbezopasnosti, no. 4(44) (2021): 73–80. http://dx.doi.org/10.21681/2311-3456-2021-4-73-80.
Full textLyon, Douglas. "The Initium X.509 Certificate Wizard." Journal of Object Technology 3, no. 10 (2004): 75. http://dx.doi.org/10.5381/jot.2004.3.10.c6.
Full textUahhabi, Zakia El, and Hanan El Bakkali. "Trust assessment of X.509 certificate based on certificate authority trustworthiness and its certificate policy." International Journal of Internet Technology and Secured Transactions 8, no. 1 (2018): 103. http://dx.doi.org/10.1504/ijitst.2018.092139.
Full textEl Uahhabi, Zakia, and Hanan El Bakkali. "Trust assessment of X.509 certificate based on certificate authority trustworthiness and its certificate policy." International Journal of Internet Technology and Secured Transactions 8, no. 1 (2018): 103. http://dx.doi.org/10.1504/ijitst.2018.10013303.
Full textXu, Da Wei. "The Implementation of Mobile Agent System Based X.509 Certificate." Advanced Materials Research 403-408 (November 2011): 1270–73. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.1270.
Full textITOH, Kouichi, Tetsuya IZU, Wakaha OGATA, Takeshi SHIMOYAMA, and Masahiko TAKENAKA. "Forgery Attacks on Time-Stamp, Signed PDF and X.509 Certificate." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92-A, no. 1 (2009): 67–75. http://dx.doi.org/10.1587/transfun.e92.a.67.
Full textTrček, Denis, and Borka Jerman-Blažič. "Certificates handling and their support within X.500 system." Microprocessing and Microprogramming 39, no. 2-5 (1993): 183–86. http://dx.doi.org/10.1016/0165-6074(93)90084-x.
Full textLee, Kwang-Hyoung, and Young-Gu Lee. "Implementation of user authentication and access control system using x.509 v3 certificate in Home network system." Journal of the Korea Academia-Industrial cooperation Society 11, no. 3 (2010): 920–25. http://dx.doi.org/10.5762/kais.2010.11.3.920.
Full textRen, Pinghong, Chu Chen, and Donggang Yang. "Checking the X.509 Certificate Linter Zlint Based on Request for Comments 5280." Journal of Physics: Conference Series 1972, no. 1 (2021): 012016. http://dx.doi.org/10.1088/1742-6596/1972/1/012016.
Full textJiang, Hua, Gang Zhang, and Jinpo Fan. "Structure Analysis and Generation of X.509 Digital Certificate Based on National Secret." Journal of Physics: Conference Series 1187, no. 4 (2019): 042067. http://dx.doi.org/10.1088/1742-6596/1187/4/042067.
Full textSamer, Wazan Ahmad, Laborde Romain, Barrere Francois, and Benzekri AbdelMalek. "A formal model of trust for calculating the quality of X.509 certificate." Security and Communication Networks 4, no. 6 (2010): 651–65. http://dx.doi.org/10.1002/sec.198.
Full textLee, Jaeil, Inkyung Jeon, Hyukjin Kwon, Dongil Shin, and Dongkyoo Shin. "Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment." Journal of Real-Time Image Processing 14, no. 1 (2016): 237–44. http://dx.doi.org/10.1007/s11554-016-0601-3.
Full textLee, Younho, Heeyoul Kim, Yongsu Park, and Hyunsoo Yoon. "An efficient delegation protocol with delegation traceability in the X.509 proxy certificate environment for computational grids." Information Sciences 178, no. 14 (2008): 2968–82. http://dx.doi.org/10.1016/j.ins.2008.03.010.
Full textLee, Jaeil, Inkyung Jeon, Hyukjin Kwon, Dongil Shin, and Dongkyoo Shin. "Erratum to: Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment." Journal of Real-Time Image Processing 16, no. 5 (2017): 1883. http://dx.doi.org/10.1007/s11554-017-0691-6.
Full textGuo, Jiaxing, Chunxiang Gu, Xi Chen, Siqi Lu, and Fushan Wei. "Automated State-Machine-Based Analysis of Hostname Verification in IPsec Implementations." Information Technology and Control 50, no. 3 (2021): 570–87. http://dx.doi.org/10.5755/j01.itc.50.3.27844.
Full text