To see the other types of publications on this topic, follow the link: X.509 Certificates.

Journal articles on the topic 'X.509 Certificates'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'X.509 Certificates.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mardianto, Is, and Kuswandi Kuswandi. "Implementasi Keamanan pada Transaksi Data Menggunakan Sertifikat Digital X.509." Jurnal ULTIMATICS 8, no. 1 (2017): 1–10. http://dx.doi.org/10.31937/ti.v8i1.496.

Full text
Abstract:
Security issues have become a major issue on the Internet. One of the security methods that are widely used today is to implement a digital certificate. Digital certificates have evolved over time, one of which is the X.509 digital certificate. Digital certificates have been widely used as authentication applications, web network authentication and other authentication systems that require digital certificates. This research is carried out by implementing an X.509 digital certificate technology as a mobile web service with its client. Secure Hash Algorithm (SHA), Diffie-Hellman, and Advanced E
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Jizhi. "The Prediction of Serial Number in OpenSSL’s X.509 Certificate." Security and Communication Networks 2019 (May 2, 2019): 1–11. http://dx.doi.org/10.1155/2019/6013846.

Full text
Abstract:
In 2007, a real faked X.509 certificate based on the chosen-prefix collision of MD5 was presented by Marc Stevens. In the method, attackers needed to predict the serial number of X.509 certificates generated by CAs besides constructing the collision pairs of MD5. After that, the randomness of the serial number is required. Then, in this case, how do we predict the random serial number? Thus, the way of generating serial number in OpenSSL was reviewed. The vulnerability was found that the value of the field “not before” of X.509 certificates generated by OpenSSL leaked the generating time of th
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Jiaxin, Zhaoxin Zhang, and Changyong Guo. "Machine Learning-Based Malicious X.509 Certificates’ Detection." Applied Sciences 11, no. 5 (2021): 2164. http://dx.doi.org/10.3390/app11052164.

Full text
Abstract:
X.509 certificates play an important role in encrypting the transmission of data on both sides under HTTPS. With the popularization of X.509 certificates, more and more criminals leverage certificates to prevent their communications from being exposed by malicious traffic analysis tools. Phishing sites and malware are good examples. Those X.509 certificates found in phishing sites or malware are called malicious X.509 certificates. This paper applies different machine learning models, including classical machine learning models, ensemble learning models, and deep learning models, to distinguis
APA, Harvard, Vancouver, ISO, and other styles
4

Hawanna, Varsharani, V. Y. Kulkarni, R. A. Rane, P. Mestri, and S. Panchal. "Risk Rating System of X.509 Certificates." Procedia Computer Science 89 (2016): 152–61. http://dx.doi.org/10.1016/j.procs.2016.06.027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kwon, Taekyoung. "Privacy preservation with X.509 standard certificates." Information Sciences 181, no. 13 (2011): 2906–21. http://dx.doi.org/10.1016/j.ins.2011.02.016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dmitruk, Joanna, and Michał Glet. "Analysis of theoretical security level of PDF Encryption mechanism based on X.509 certificates." Bulletin of the Military University of Technology 66, no. 4 (2017): 95–110. http://dx.doi.org/10.5604/01.3001.0010.8221.

Full text
Abstract:
PDF Encryption is a content security mechanism developed and used by Adobe in their products. In this paper, we have checked a theoretical security level of a variant that uses public key infrastructure and X.509 certificates. We have described a basis of this mechanism and we have performed a simple security analysis. Then, we have showed possible tweaks and security improvements. At the end, we have given some recommendations that can improve security of a content secured with PDF Encryption based on X.509 certificates. Keywords: DRM, cryptography, security level, PDF Encryption, Adobe, X.50
APA, Harvard, Vancouver, ISO, and other styles
7

Chadwick, D. W., A. Otenko, and E. Ball. "Role-based access control with X.509 attribute certificates." IEEE Internet Computing 7, no. 2 (2003): 62–69. http://dx.doi.org/10.1109/mic.2003.1189190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bindel, Nina, Johannes Braun, Luca Gladiator, Tobias Stöckert, and Johannes Wirth. "X.509-Compliant Hybrid Certificates for the Post-Quantum Transition." Journal of Open Source Software 4, no. 40 (2019): 1606. http://dx.doi.org/10.21105/joss.01606.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wazan, Ahmad Samer, Romain Laborde, David W. Chadwick, et al. "Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker." Security and Communication Networks 2017 (2017): 1–23. http://dx.doi.org/10.1155/2017/6907146.

Full text
Abstract:
A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propagate trust in authentication over the Internet. This technology is based on a trust model defined by the original X.509 (1988) standard and is composed of three entities: the certification authority (CA), the certificate holder (or subject), and the Relying Party (RP). The CA plays the role of a trusted third party between the certificate holder and the RP. In many use cases, this trust model has worked successfully. However, we argue that the application of this model on the Internet implies that
APA, Harvard, Vancouver, ISO, and other styles
10

Ravikanth Reddy Gudipati. "Public key infrastructure: The cornerstone of modern authentication and authorization." World Journal of Advanced Research and Reviews 26, no. 1 (2025): 1857–63. https://doi.org/10.30574/wjarr.2025.26.1.1220.

Full text
Abstract:
Public Key Infrastructure (PKI) is the cornerstone of modern digital security, providing essential mechanisms for authentication and authorization across diverse technological landscapes. With the rising complexity of digital environments and the increasing adoption of cloud services, IoT devices, and Zero Trust architectures, PKI has evolved to meet emerging security challenges. The implementation of PKI encompasses crucial components, including public-private key pairs, certificate authorities, and X.509 certificates, which enable secure communication, identity verification, and access contr
APA, Harvard, Vancouver, ISO, and other styles
11

H, Sowmyashree, and Sharmila K.P. "Achieving Security and Data Privacy for VANET using X.509 Certificates." IJARCCE 4, no. 5 (2015): 701–6. http://dx.doi.org/10.17148/ijarcce.2015.45147.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Lippert, M., V. Karatsiolis, A. Wiesmaier, and J. Buchmann. "Life-cycle management of X.509 certificates based on LDAP directories." Journal of Computer Security 14, no. 5 (2006): 419–39. http://dx.doi.org/10.3233/jcs-2006-14503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Sun, Yuteng, Joyanta Debnath, Wenzheng Hong, Omar Chowdhury, and Sze Yiu Chau. "On the Unnecessary Complexity of Names in X.509 and Their Impact on Implementations." Proceedings of the ACM on Software Engineering 2, FSE (2025): 1454–74. https://doi.org/10.1145/3715785.

Full text
Abstract:
TheX.509 Public Key Infrastructure (PKI) provides a cryptographically verifiable mechanism for authenticating a binding of an entity’s public-key with its identity, presented in a tamper-proof digital certificate. This often serves as a foundational building block for achieving different security guarantees in many critical applications and protocols (e.g., SSL/TLS). Identities in the context of X.509 PKI are often captured as names, which are encoded in certificates as composite records with different optional fields that can store various types of string values (e.g., ASCII, UTF8). Although
APA, Harvard, Vancouver, ISO, and other styles
14

Ceccanti, Andrea, Enrico Vianello, Marco Caberletti, and Francesco Giacomini. "Beyond X.509: token-based authentication and authorization for HEP." EPJ Web of Conferences 214 (2019): 09002. http://dx.doi.org/10.1051/epjconf/201921409002.

Full text
Abstract:
X.509 certificates and VOMS have proved to be a secure and reliable solution for authentication and authorization on the Grid, but also showed usability issues and required the development of ad-hoc services and libraries to support VO-based authorization schemes in Grid middleware and experiment computing frameworks. The need to move beyond X.509 certificates is recognized as an important objective in the HEP R&D roadmap for software and computing, to overcome the usability issues of the current AAI and embrace recent advancement in web technologies widely adopted in industry, but also to
APA, Harvard, Vancouver, ISO, and other styles
15

Talamo, Maurizio, Franco Arcieri, Andrea Dimitri, and Christian H. Schunck. "A Blockchain based PKI Validation System based on Rare Events Management." Future Internet 12, no. 2 (2020): 40. http://dx.doi.org/10.3390/fi12020040.

Full text
Abstract:
Public key infrastructures (PKIs) are the cornerstone for the security of the communication layer of online services relying on certificate-based authentication, such as e-commerce, e-government, online banking, cloud services, and many others. A PKI is an infrastructure based on a hierarchical model, but the use of PKIs in non-hierarchical contexts has exposed them to many types of attacks. Here, we discuss weaknesses exploited in past attacks and we propose a solution based on an original consensus algorithm developed for use on blockchain technology. In this implementation we retain the ful
APA, Harvard, Vancouver, ISO, and other styles
16

Ahamad, Shaik Shakeel, V. N. Sastry, and Siba K. Udgata. "Secure and Optimized Mobile Based Merchant Payment Protocol using Signcryption." International Journal of Information Security and Privacy 6, no. 2 (2012): 64–94. http://dx.doi.org/10.4018/jisp.2012040105.

Full text
Abstract:
The authors propose a Secure and Optimized Mobile based Merchant Payment (SOMMP) Protocol using Signcryption scheme with Forward Secrecy (SFS) based on elliptic curve which consumes less computational and communication cost. In SOMMP client sends message in the form of TransCertC (Transaction Certificate) which is a X.509 SLC (X.509 Short Lived Certificate) thereby reducing the client interactions with the engaging parties thereby reducing the consumption of resources (from Client’s perspective) which are very scarce in Resource Constrained Devices like Mobile Phones. In SOMMP protocol WSLC (W
APA, Harvard, Vancouver, ISO, and other styles
17

Muftic, Sead. "BIX Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger." Ledger 1 (December 21, 2016): 19–37. http://dx.doi.org/10.5195/ledger.2016.27.

Full text
Abstract:
With the widespread use of Internet, Web, and mobile technologies, a new category of applications and transactions that requires anonymity is gaining increased interest and importance. Examples of such new applications are innovative payment systems, digital notaries, electronic voting, documents sharing, electronic auctions, medical applications, and many others. In addition to anonymity, these applications and transactions also require standard security services: identification, authentication, and authorization of users and protection of their transactions. Providing those services in combi
APA, Harvard, Vancouver, ISO, and other styles
18

Bockelman, Brian, Andrea Ceccanti, Ian Collier, et al. "WLCG Authorisation from X.509 to Tokens." EPJ Web of Conferences 245 (2020): 03001. http://dx.doi.org/10.1051/epjconf/202024503001.

Full text
Abstract:
The WLCG Authorisation Working Group was formed in July 2017 with the objective to understand and meet the needs of a future-looking Authentication and Authorisation Infrastructure (AAI) for WLCG experiments. Much has changed since the early 2000s when X.509 certificates presented the most suitable choice for authorisation within the grid; progress in token based authorisation and identity federation has provided an interesting alternative with notable advantages in usability and compatibility with external (commercial) partners. The need for interoperability in this new model is paramount as
APA, Harvard, Vancouver, ISO, and other styles
19

Raghunathan, Subhashini, Armin R. Mikler, and Cliff Cozzolino. "Secure agent computation: X.509 Proxy Certificates in a multi-lingual agent framework." Journal of Systems and Software 75, no. 1-2 (2005): 125–37. http://dx.doi.org/10.1016/j.jss.2004.01.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Ciaschini, Vincenzo, Lucia Morganti, Matteo Tenti, and Carmelo Pellegrino. "Dataclient: a simple interface for scientific data transfers hiding x.509 complexities." EPJ Web of Conferences 214 (2019): 04003. http://dx.doi.org/10.1051/epjconf/201921404003.

Full text
Abstract:
Since the current data infrastructure of the HEP experiments is based on GridFTP, most computing centres have adapted and based their own access to the data on the X.509. This is an issue for smaller experiments that do not have the resources to train their researchers in the complexities of X.509 certificates and that would prefer an approach based on username/password. On the other hand, asking computing centres to support different access strategies is not so straightforward, as this would require a significant investment of effort and manpower. At CNAF-INFN Tier1 we tackled this problem by
APA, Harvard, Vancouver, ISO, and other styles
21

Bauer, Daniela, David Colling, Simon Fayer, Janusz Martyniak, and Alexander Richards. "An open source data transfer tool kit for research data." EPJ Web of Conferences 214 (2019): 04039. http://dx.doi.org/10.1051/epjconf/201921404039.

Full text
Abstract:
We present the prototype of an open source data transfer tool kit. It provides an easy to use ‘drag-and-drop’ web interface for users to transfer files between institutions that do not have a grid infrastructure in place. The underlying technology leverages standard grid technologies. e.g. automatic generation of X.509 certificates, but remains completely hidden from the user.
APA, Harvard, Vancouver, ISO, and other styles
22

Srinivas Kolluri. "Unified Identity Management in the Cloud: SAP IAS Integration with SAP BTP." Journal of Computer Science and Technology Studies 7, no. 5 (2025): 662–70. https://doi.org/10.32996/jcsts.2025.7.5.73.

Full text
Abstract:
SAP Identity Authentication Service (IAS) integration with SAP Business Technology Platform (BTP) provides enterprise-grade identity management for distributed cloud environments. Built on SAP NetWeaver AS ABAP infrastructure, the solution delivers secure authentication, authorization, and identity governance through standardized protocols and security controls. The integration framework enables unified access management across cloud and on-premise applications through sophisticated token management, policy enforcement, and audit mechanisms. The implementation supports diverse authentication m
APA, Harvard, Vancouver, ISO, and other styles
23

El Mane, Adil, Younes Chihab, and Redouan Korchiyne. "Digital Signature for data and documents using operating PKI certificates." SHS Web of Conferences 119 (2021): 07004. http://dx.doi.org/10.1051/shsconf/202111907004.

Full text
Abstract:
This report represents my researching work for a six-month internship in Lex Persona Enterprise. "The implementation of applications that sign data and files electronically using operating digital certificates" is the central theme of this research. This project brings together many applications related to compliance with well-specified programming constraints to sign files electronically. The research has the goal of signing PDF documents digitally using the hash-and-sign method. The SHA-256 function as the hash function and RSA as encryption algorithm, accompanied with PKI certificates type
APA, Harvard, Vancouver, ISO, and other styles
24

Kwon, Hyunsoo. "Secure and Scalable Device Attestation Protocol with Aggregate Signature." Symmetry 17, no. 5 (2025): 698. https://doi.org/10.3390/sym17050698.

Full text
Abstract:
In cloud computing environments, security challenges emerge due to compromised firmware and supply chain attacks that target devices deployed within data centers. The Secure Protocol and Data Model (SPDM) has been widely adopted for device attestation, which verifies device identity and firmware integrity. However, the scalability of the SPDM is challenged by the resource constraints of peripheral devices and the inherent asymmetry of the protocol, where a heavy verification burden on the central requester leads to a potential bottleneck. In order to solve these problems, we propose a secure a
APA, Harvard, Vancouver, ISO, and other styles
25

Sandhya, Guduru. "Zero Trust Automation: SPIFFE/SPIRE for Identity Federation and OpenZiti in Microsegmented Networks." European Journal of Advances in Engineering and Technology 8, no. 10 (2021): 122–26. https://doi.org/10.5281/zenodo.15387226.

Full text
Abstract:
As organizations adopt cloud-native infrastructure and microservices, traditional network security approaches are no longer sufficient. This paper presents an automated Zero Trust framework integrating SPIFFE/SPIRE for identity federation with OpenZiti for application-layer microsegmentation. SPIFFE provides a standard for workload identity, while SPIRE issues and manages these identities automatically in Kubernetes using X.509 certificates known as SVIDs. These identities enable secure authentication between services using mutual TLS (mTLS), enforced through the Envoy proxy. To strengthen com
APA, Harvard, Vancouver, ISO, and other styles
26

Kamola, Mariusz. "Internet of Things with Lightweight Identities Implemented Using DNS DANE—Architecture Proposal." Sensors 18, no. 8 (2018): 2517. http://dx.doi.org/10.3390/s18082517.

Full text
Abstract:
Domain Name Service (DNS) and its certification related resource records are appealing alternative to the standard X.509 certification framework, in provision of identities for Internet of Things (IoT) smart devices. We propose to also use DNS to store device owner identification data in device certificates. A working demonstration software has been developed as proof of this concept, which uses an external identity provider run by national authorities. As a result, smart devices are equipped with certificates that safely identify both the device and its owner. Hardware requirements make such
APA, Harvard, Vancouver, ISO, and other styles
27

Ngoc, Luong Thai, and Vo Thanh Tu. "A DIGITAL CERTIFICATION MANAGEMENT MECHANISMS AND SECURITY ROUTING PROTOCOL IN MOBILE AD HOC NETWORK." Journal of Computer Science and Cybernetics 34, no. 3 (2018): 199–217. http://dx.doi.org/10.15625/1813-9663/34/3/12259.

Full text
Abstract:
Routing services in Mobile Ad hoc Network (MANET) are the goal of denial of service (DoS) attack forms, such as: Blackhole, Sinkhole, Grayhole, Wormhole, Flooding and Whirlwind. There are some related researches to improve of security performance of routing services, such as H(AODV), OTP_AODV, SAODV and ARAN. They require hypothetical conditions that public key infrastructure (PKI) is available. TAMAN routing protocol supported a digital certificate verification service adaptively and quickly to the dynamic topology of the network without relying on any certification authorities (CA). However,
APA, Harvard, Vancouver, ISO, and other styles
28

Gergely, Adam Mihai, and Bogdan Crainicu. "The Concept of a Distributed Repository for Validating X.509 Attribute Certificates in a Privilege Management Infrastructure." Procedia Technology 22 (2016): 926–30. http://dx.doi.org/10.1016/j.protcy.2016.01.087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Wirtgen, Thomas, Nicolas Rybowski, Cristel Pelsser, and Olivier Bonaventure. "The Multiple Benefits of a Secure Transport for BGP." Proceedings of the ACM on Networking 2, CoNEXT4 (2024): 1–23. http://dx.doi.org/10.1145/3696406.

Full text
Abstract:
BGP distributes prefixes advertised by Autonomous Systems (ASes) and computes the best paths between them. It is the only routing protocol used to exchange interdomain routes on the Internet. Since its original definition in the late 1980s, BGP uses TCP. To prevent attacks, BGP has been extended with features such as TCP-MD5, TCP-AO, GTSM and data-plane filters. However, these ad hoc solutions were introduced gradually as the Internet grew. In parallel, TLS was standardized to secure end-to-end data-plane communications. Today, a large proportion of the Internet traffic is secured using TLS. S
APA, Harvard, Vancouver, ISO, and other styles
30

Martinez Pedreira, Miguel, Costin Grigoras, Volodymyr Yurchenko, and Maksim Melnik Storetvedt. "The Security model of the ALICE next generation Grid framework." EPJ Web of Conferences 214 (2019): 03042. http://dx.doi.org/10.1051/epjconf/201921403042.

Full text
Abstract:
JAliEn (Java-AliEn) is the ALICE next generation Grid framework which will be used for the top-level distributed computing resources management during the LHC Run 3 and onward. While preserving an interface familiar to the ALICE users, its performance and scalability are an order of magnitude better than the currently used framework. To implement the JAliEn security model, we have developed the so-called Token Certificates – short lived full Grid certificates, generated by central services automatically or on the client’s request. Token Certificates allow fine-grained control over user/client
APA, Harvard, Vancouver, ISO, and other styles
31

Chia, Jason, Swee-Huay Heng, Ji-Jian Chin, Syh-Yuan Tan, and Wei-Chuen Yau. "An Implementation Suite for a Hybrid Public Key Infrastructure." Symmetry 13, no. 8 (2021): 1535. http://dx.doi.org/10.3390/sym13081535.

Full text
Abstract:
Public key infrastructure (PKI) plays a fundamental role in securing the infrastructure of the Internet through the certification of public keys used in asymmetric encryption. It is an industry standard used by both public and private entities that costs a lot of resources to maintain and secure. On the other hand, identity-based cryptography removes the need for certificates, which in turn lowers the cost. In this work, we present a practical implementation of a hybrid PKI that can issue new identity-based cryptographic keys for authentication purposes while bootstrapping trust with existing
APA, Harvard, Vancouver, ISO, and other styles
32

Hermawan, Wawan. "Single Sign On Using Keycloak Integrated Public Key Infrastructure for User Authentication In Indonesia’s Electronic Based Government System." Advance Sustainable Science Engineering and Technology 5, no. 2 (2023): 0230204. http://dx.doi.org/10.26877/asset.v5i2.15795.

Full text
Abstract:
The government in carrying out its function as a public administration servant is regulated in law of the Republic of Indonesia number 25/2009 on public services. In this regulated about electronic government (e-government), many individuals use various web applications that require users to authenticate themselves to access each application. Many entities require various web- based applications for operational activities. This makes centralized access management for web-based applications very much needed. Currently, access management is often implemented using Single Sign On (SSO) with passw
APA, Harvard, Vancouver, ISO, and other styles
33

Dossett, David, and Martin Sevior. "Prompt calibration automation at Belle II." EPJ Web of Conferences 245 (2020): 02016. http://dx.doi.org/10.1051/epjconf/202024502016.

Full text
Abstract:
The Belle II detector began collecting data from e+e− collisions at the SuperKEKB electron-positron collider in March 2019. Belle II aims to collect a data sample 50 times larger than the previous generation of B-factories. For Belle II analyses to be competitive it is crucial that calibration payloads for this data are calculated promptly prior to data reconstruction. To accomplish this goal a Python plugin package has been developed based on the open-source Apache Airflow package; using Directed Acyclic Graphs (DAGs) to describe the ordering of processes and Flask to provide administration a
APA, Harvard, Vancouver, ISO, and other styles
34

Sharma, Giriraj, Amit M. Joshi, and Saraju P. Mohanty. "Fortified-Grid: Fortifying Smart Grids through the Integration of the Trusted Platform Module in Internet of Things Devices." Information 14, no. 9 (2023): 491. http://dx.doi.org/10.3390/info14090491.

Full text
Abstract:
This paper presents a hardware-assisted security primitive that integrates the Trusted Platform Module (TPM) into IoT devices for authentication in smart grids. Data and device security plays a pivotal role in smart grids since they are vulnerable to various attacks that could risk grid failure. The proposed Fortified-Grid security primitive provides an innovative solution, leveraging the TPM for attestation coupled with standard X.509 certificates. This methodology serves a dual purpose, ensuring the authenticity of IoT devices and upholding software integrity, an indispensable foundation for
APA, Harvard, Vancouver, ISO, and other styles
35

Mambelli, Marco, Bruno Coimbra, and Dennis Box. "Transitioning GlideinWMS, a multi domain distributed workload manager, from GSI proxies to tokens and other granular credentials." EPJ Web of Conferences 295 (2024): 04051. http://dx.doi.org/10.1051/epjconf/202429504051.

Full text
Abstract:
GlideinWMS is a distributed workload manager that has been used in production for many years to provision resources for experiments like CERN’s CMS, many Neutrino experiments, and the OSG. Its security model was based mainly on GSI (Grid Security Infrastructure), using X.509 certificate proxies and VOMS (Virtual Organization Membership Service) extensions. Even when other credentials, like SSH keys, were used to authenticate with resources, proxies were also added all the time, to establish the identity of the requestor and the associated memberships or privileges. This single credential was u
APA, Harvard, Vancouver, ISO, and other styles
36

Lapshichyov, Vitaly, and Oleg Makarevich. "Method for Detecting and Identification of Tor Network Data by Wireshark Analyzer." Voprosy kiberbezopasnosti, no. 4(44) (2021): 73–80. http://dx.doi.org/10.21681/2311-3456-2021-4-73-80.

Full text
Abstract:
Purpose of the study: development of a method that allows detecting and identifying packets of the Tor network, including obfuscated packets on the local machine of the network user, by a Wireshark sniffer using the filter syntax based on the features of the Tor network packets characteristic of the TLS v1.2 and v1.3 encryption versions; studying the possibility of using the SSL Bump attack (decrypting https traffic on a virtual server using self-signed x.509 certificates) to overcome the obfuscation of Tor network packets. Method: software analysis of transmitted network packets, decompositio
APA, Harvard, Vancouver, ISO, and other styles
37

Lyon, Douglas. "The Initium X.509 Certificate Wizard." Journal of Object Technology 3, no. 10 (2004): 75. http://dx.doi.org/10.5381/jot.2004.3.10.c6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Uahhabi, Zakia El, and Hanan El Bakkali. "Trust assessment of X.509 certificate based on certificate authority trustworthiness and its certificate policy." International Journal of Internet Technology and Secured Transactions 8, no. 1 (2018): 103. http://dx.doi.org/10.1504/ijitst.2018.092139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

El Uahhabi, Zakia, and Hanan El Bakkali. "Trust assessment of X.509 certificate based on certificate authority trustworthiness and its certificate policy." International Journal of Internet Technology and Secured Transactions 8, no. 1 (2018): 103. http://dx.doi.org/10.1504/ijitst.2018.10013303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Xu, Da Wei. "The Implementation of Mobile Agent System Based X.509 Certificate." Advanced Materials Research 403-408 (November 2011): 1270–73. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.1270.

Full text
Abstract:
The paper introduces the design objective and design scheme of mobile agent-based X.509 certificate management system, and describes the key technologies such as encryption, the certificate processing format and coding, secure communication protocols such as SSL in detaile.
APA, Harvard, Vancouver, ISO, and other styles
41

ITOH, Kouichi, Tetsuya IZU, Wakaha OGATA, Takeshi SHIMOYAMA, and Masahiko TAKENAKA. "Forgery Attacks on Time-Stamp, Signed PDF and X.509 Certificate." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92-A, no. 1 (2009): 67–75. http://dx.doi.org/10.1587/transfun.e92.a.67.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Trček, Denis, and Borka Jerman-Blažič. "Certificates handling and their support within X.500 system." Microprocessing and Microprogramming 39, no. 2-5 (1993): 183–86. http://dx.doi.org/10.1016/0165-6074(93)90084-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Lee, Kwang-Hyoung, and Young-Gu Lee. "Implementation of user authentication and access control system using x.509 v3 certificate in Home network system." Journal of the Korea Academia-Industrial cooperation Society 11, no. 3 (2010): 920–25. http://dx.doi.org/10.5762/kais.2010.11.3.920.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Ren, Pinghong, Chu Chen, and Donggang Yang. "Checking the X.509 Certificate Linter Zlint Based on Request for Comments 5280." Journal of Physics: Conference Series 1972, no. 1 (2021): 012016. http://dx.doi.org/10.1088/1742-6596/1972/1/012016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Jiang, Hua, Gang Zhang, and Jinpo Fan. "Structure Analysis and Generation of X.509 Digital Certificate Based on National Secret." Journal of Physics: Conference Series 1187, no. 4 (2019): 042067. http://dx.doi.org/10.1088/1742-6596/1187/4/042067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Samer, Wazan Ahmad, Laborde Romain, Barrere Francois, and Benzekri AbdelMalek. "A formal model of trust for calculating the quality of X.509 certificate." Security and Communication Networks 4, no. 6 (2010): 651–65. http://dx.doi.org/10.1002/sec.198.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Lee, Jaeil, Inkyung Jeon, Hyukjin Kwon, Dongil Shin, and Dongkyoo Shin. "Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment." Journal of Real-Time Image Processing 14, no. 1 (2016): 237–44. http://dx.doi.org/10.1007/s11554-016-0601-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Lee, Younho, Heeyoul Kim, Yongsu Park, and Hyunsoo Yoon. "An efficient delegation protocol with delegation traceability in the X.509 proxy certificate environment for computational grids." Information Sciences 178, no. 14 (2008): 2968–82. http://dx.doi.org/10.1016/j.ins.2008.03.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Lee, Jaeil, Inkyung Jeon, Hyukjin Kwon, Dongil Shin, and Dongkyoo Shin. "Erratum to: Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment." Journal of Real-Time Image Processing 16, no. 5 (2017): 1883. http://dx.doi.org/10.1007/s11554-017-0691-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Guo, Jiaxing, Chunxiang Gu, Xi Chen, Siqi Lu, and Fushan Wei. "Automated State-Machine-Based Analysis of Hostname Verification in IPsec Implementations." Information Technology and Control 50, no. 3 (2021): 570–87. http://dx.doi.org/10.5755/j01.itc.50.3.27844.

Full text
Abstract:
Owing to the advent and rapid development of Internet communication technology, network security protocols with cryptography as their core have gradually become an important means of ensuring secure communications. Among numerous security protocols, certificate authentication is a common method of identity authentication, and hostname verification is a critical but easily neglected process in certificate authentication. Hostname verification validates the identity of a remote target by checking whether the hostname of the communication partner matches any name in the X.509 certificate. Notably
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!