Literatura académica sobre el tema "Public key certificate"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Public key certificate".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Public key certificate"
Chien, Hung-Yu. "Dynamic Public Key Certificates with Forward Secrecy." Electronics 10, no. 16 (2021): 2009. http://dx.doi.org/10.3390/electronics10162009.
Texto completoFord, Warwick. "Advances in public-key certificate standards." ACM SIGSAC Review 13, no. 3 (1995): 9–15. http://dx.doi.org/10.1145/219618.219714.
Texto completoDirksen, Alexandra, David Klein, Robert Michael, Tilman Stehr, Konrad Rieck, and Martin Johns. "LogPicker: Strengthening Certificate Transparency Against Covert Adversaries." Proceedings on Privacy Enhancing Technologies 2021, no. 4 (2021): 184–202. http://dx.doi.org/10.2478/popets-2021-0066.
Texto completoWazan, Ahmad Samer, Romain Laborde, David W. Chadwick, et al. "Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker." Security and Communication Networks 2017 (2017): 1–23. http://dx.doi.org/10.1155/2017/6907146.
Texto completoMahmoud, Mohamed M. E. A., Jelena Misic, Kemal Akkaya, and Xuemin Shen. "Investigating Public-Key Certificate Revocation in Smart Grid." IEEE Internet of Things Journal 2, no. 6 (2015): 490–503. http://dx.doi.org/10.1109/jiot.2015.2408597.
Texto completoClarke, Dwaine. "Hybrid certificate closure-chain discovery public key system." International Journal of Computational Science and Engineering 9, no. 4 (2014): 312. http://dx.doi.org/10.1504/ijcse.2014.060714.
Texto completoLu, Yang, and Jiguo Li. "Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/295419.
Texto completoK.C, Amir, Harri Forsgren, Kaj Grahn, Timo Karvi, and Göran Pulkkis. "Security and Trust of Public Key Cryptography for HIP and HIP Multicast." International Journal of Dependable and Trustworthy Information Systems 2, no. 3 (2011): 17–35. http://dx.doi.org/10.4018/jdtis.2011070102.
Texto completoBalachandra and Prema K.V. "Certificate Path Verification in Hierarchical and Peer-to-Peer Public Key Infrastructures." Journal of Technology Management for Growing Economies 1, no. 1 (2010): 77–92. http://dx.doi.org/10.15415/jtmge.2010.11005.
Texto completoTanwar, Sarvesh, and Anil Kumar. "A Proposed Scheme for Remedy of Man-In-The-Middle Attack on Certificate Authority." International Journal of Information Security and Privacy 11, no. 3 (2017): 1–14. http://dx.doi.org/10.4018/ijisp.2017070101.
Texto completoTesis sobre el tema "Public key certificate"
Hagström, Åsa. "Understanding Certificate Revocation." Licentiate thesis, Linköping University, Linköping University, Department of Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-5477.
Texto completoGo, Hiu-wing, and 吳曉頴. "Forward security and certificate management in mobile AD Hoc networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B30331080.
Texto completoAmbers, Vanessa P. Kelly Amanda M. "Installation, configuration and operational testing of a PKI certificate server and its supporting services /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FAmbers.pdf.
Texto completoMacMichael, John L. "A survey and security strength classification of PKI certificate revocation management implementations." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FMacMichael.pdf.
Texto completoKelly, Amanda M., and Vanessa P. Ambers. "Installation, configuration and operational testing of a PKI certificate server and its supporting services." Thesis, Monterey California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1615.
Texto completoNilsson, Christoffer. "Annulering av ogiltiga certifikat i Public-Key Infrastructures." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3985.
Texto completoMacdonell, James Patrick. "MiniCA: A web-based certificate authority." CSUSB ScholarWorks, 2007. https://scholarworks.lib.csusb.edu/etd-project/3256.
Texto completoHendershot, Travis S. "Towards Using Certificate-Based Authentication as a Defense Against Evil Twins in 802.11 Networks." BYU ScholarsArchive, 2016. https://scholarsarchive.byu.edu/etd/6115.
Texto completoFredriksson, Bastian. "A Distributed Public Key Infrastructure for the Web Backed by a Blockchain." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-210912.
Texto completoGoold, Jeremy C. "Improving Routing Security Using a Decentralized Public Key Distribution Algorithm." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd797.pdf.
Texto completoLibros sobre el tema "Public key certificate"
Komar, Brian. Windows Server 2008 PKI and certificate security. Microsoft Press, 2008.
Buscar texto completoKomar, Brian. Windows Server 2008 PKI and certificate security. Microsoft Press, 2008.
Buscar texto completoMartin, Keith M. Public-Key Management. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0011.
Texto completoWindows Server 2008 PKI and Certificate Security (PRO-Other) (PRO-Other). Microsoft Press, 2008.
Buscar texto completoXisong, Lai, He Quande, and Ke xue ji shu zi liao zhong xin., eds. Gong kai jin yao ji chu jian she yu ping zheng guan li zhong xin: Public key infrastructure and certificate authority. Xing zheng yuan guo jia ke xue wei yuan hui ke xue ji shu zi liao zhong xin, 2003.
Buscar texto completoBrands, Stefan. Rethinking Public Key Infrastructures and Digital Certificates. The MIT Press, 2000. http://dx.doi.org/10.7551/mitpress/5931.001.0001.
Texto completoBrands, Stefan. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, 2000.
Buscar texto completoBrands, Stefan. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, 2000.
Buscar texto completoRethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. The MIT Press, 2000.
Buscar texto completoCapítulos de libros sobre el tema "Public key certificate"
Buchmann, Johannes A., Evangelos Karatsiolis, and Alexander Wiesmaier. "Certificate Policies." In Introduction to Public Key Infrastructures. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40657-7_8.
Texto completoGalindo, David, Paz Morillo, and Carla Ràfols. "Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes." In Public Key Infrastructure. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11774716_7.
Texto completoMuñoz, Jose L., Jordi Forné, Oscar Esparza, and Miguel Soriano. "CERVANTES – A Certificate Validation Test-Bed." In Public Key Infrastructure. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25980-0_3.
Texto completoRussell, Selwyn. "Recursive Certificate Structures for X.509 Systems." In Public Key Infrastructure. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25980-0_11.
Texto completoWen, Wu, Takamichi Saito, and Fumio Mizoguchi. "Security of Public Key Certificate Based Authentication Protocols." In Public Key Cryptography. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-540-46588-1_14.
Texto completoLiu, Chuchang, Maris A. Ozols, Marie Henderson, and Tony Cant. "A State-Based Model for Certificate Management Systems." In Public Key Cryptography. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-540-46588-1_7.
Texto completoElwailly, Farid F., Craig Gentry, and Zulfikar Ramzan. "QuasiModo: Efficient Certificate Validation and Revocation." In Public Key Cryptography – PKC 2004. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24632-9_27.
Texto completoDomingo-Ferrer, Josep. "On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments." In Public Key Infrastructure. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25980-0_15.
Texto completoLai, Junzuo, and Weidong Kou. "Self-Generated-Certificate Public Key Encryption Without Pairing." In Public Key Cryptography – PKC 2007. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-71677-8_31.
Texto completoKambourakis, Georgios, Angelos Rouskas, and Dimitris Gritzalis. "Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks." In Public Key Infrastructure. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25980-0_23.
Texto completoActas de conferencias sobre el tema "Public key certificate"
Mahmoud, Mohamed M. E. A., Jelena Misic, and Xuemin Shen. "Efficient public-key certificate revocation schemes for smart grid." In 2013 IEEE Global Communications Conference (GLOBECOM 2013). IEEE, 2013. http://dx.doi.org/10.1109/glocom.2013.6831167.
Texto completoGarba, Abba, Qinwen Hu, Zhong Chen, and Muhammad Rizwan Asghar. "BB-PKI: Blockchain-Based Public Key Infrastructure Certificate Management." In 2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC/SmartCity/DSS). IEEE, 2020. http://dx.doi.org/10.1109/hpcc-smartcity-dss50907.2020.00108.
Texto completoTartan, Chloe, Craig Wright, Michaella Pettit, and Wei Zhang. "A Scalable Bitcoin-based Public Key Certificate Management System." In 18th International Conference on Security and Cryptography. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010556805480559.
Texto completoHu, Chaoju, and Na Xu. "Application of XTR Public Key System in Certificate Authority System." In 2008 International Conference on Computer Science and Software Engineering. IEEE, 2008. http://dx.doi.org/10.1109/csse.2008.355.
Texto completoAditia, Mayank K., Srikar Paida, Fahiem Altaf, and Soumyadev Maity. "Certificate-less Public Key Encryption For Secure e-Healthcare Systems." In 2019 IEEE Conference on Information and Communication Technology (CICT). IEEE, 2019. http://dx.doi.org/10.1109/cict48419.2019.9066190.
Texto completoSur, Chul, Chae Duk Jung, and Kyung Hyune Rhee. "Multi-receiver Certificate-Based Encryption and Application to Public Key Broadcast Encryption." In 2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security (BLISS 2007). IEEE, 2007. http://dx.doi.org/10.1109/bliss.2007.23.
Texto completoYao, Xuanxia, Xiaoguang Han, and Xiaojiang Du. "A light-weight certificate-less public key cryptography scheme based on ECC." In 2014 23rd International Conference on Computer Communication and Networks (ICCCN). IEEE, 2014. http://dx.doi.org/10.1109/icccn.2014.6911773.
Texto completoChoi, Pil Joo, Hyun Il Kim, and Dong Kyue Kim. "AMI authentication method based on hardware public key certificate using unique identifier." In 2015 International SoC Design Conference (ISOCC). IEEE, 2015. http://dx.doi.org/10.1109/isocc.2015.7401727.
Texto completoLee, Byoungcheon. "Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based Cryptography." In 2010 International Conference on Availability, Reliability, and Security (ARES). IEEE, 2010. http://dx.doi.org/10.1109/ares.2010.49.
Texto completoBala, Dania Qara, Soumyadev Maity, and Sanjay Kumar Jena. "Mutual authentication for IoT smart environment using certificate-less public key cryptography." In 2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS). IEEE, 2017. http://dx.doi.org/10.1109/ssps.2017.8071559.
Texto completoInformes sobre el tema "Public key certificate"
Santesson, S., R. Housley, S. Bajaj, and L. Rosenthol. Internet X.509 Public Key Infrastructure -- Certificate Image. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6170.
Texto completoCooper, D., S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5280.
Texto completoHousley, R., W. Polk, W. Ford, and D. Solo. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3280.
Texto completoLinsenbardt, D., S. Pontius, and A. Sturgeon. Internet X.509 Public Key Infrastructure Warranty Certificate Extension. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4059.
Texto completoAdams, C., and S. Farrell. Internet X.509 Public Key Infrastructure Certificate Management Protocols. RFC Editor, 1999. http://dx.doi.org/10.17487/rfc2510.
Texto completoKent, S., D. Kong, K. Seo, and R. Watro. Certificate Policy (CP) for the Resource Public Key Infrastructure (RPKI). RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6484.
Texto completoTuecke, S., V. Welch, D. Engert, L. Pearlman, and M. Thompson. Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile. RFC Editor, 2004. http://dx.doi.org/10.17487/rfc3820.
Texto completoAdams, C., S. Farrell, T. Kause, and T. Mononen. Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP). RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4210.
Texto completoHousley, R., W. Ford, W. Polk, and D. Solo. Internet X.509 Public Key Infrastructure Certificate and CRL Profile. RFC Editor, 1999. http://dx.doi.org/10.17487/rfc2459.
Texto completoBlinov, M., and C. Adams. Alternative Certificate Formats for the Public-Key Infrastructure Using X.509 (PKIX) Certificate Management Protocols. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4212.
Texto completo