Auswahl der wissenschaftlichen Literatur zum Thema „Certificate revocation list, CRL“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Certificate revocation list, CRL" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Certificate revocation list, CRL"
Riad, Khaled, und Mohamed Elhoseny. „A Blockchain-Based Key-Revocation Access Control for Open Banking“. Wireless Communications and Mobile Computing 2022 (31.01.2022): 1–14. http://dx.doi.org/10.1155/2022/3200891.
Der volle Inhalt der QuelleDenny, Deljo, und Kukatlapalli Pradeep Kumar. „Secure Authenticated Communication Via Digital Signature and Clear List in VANETs“. ECS Transactions 107, Nr. 1 (24.04.2022): 20065–71. http://dx.doi.org/10.1149/10701.20065ecst.
Der volle Inhalt der QuelleZhao, Cong, Jiayu Qi, Tianhan Gao und Xinyang Deng. „IMF-PR: An Improved Morton-Filter-Based Pseudonym-Revocation Scheme in VANETs“. Sensors 23, Nr. 8 (18.04.2023): 4066. http://dx.doi.org/10.3390/s23084066.
Der volle Inhalt der QuelleMahmood, Shahid, Moneeb Gohar, Jin-Ghoo Choi, Seok-Joo Koh, Hani Alquhayz und Murad Khan. „Digital Certificate Verification Scheme for Smart Grid using Fog Computing (FONICA)“. Sustainability 13, Nr. 5 (26.02.2021): 2549. http://dx.doi.org/10.3390/su13052549.
Der volle Inhalt der QuelleLim, Kiho, Weihua Liu, Xiwei Wang und Jingon Joung. „SSKM: Scalable and Secure Key Management Scheme for Group Signature Based Authentication and CRL in VANET“. Electronics 8, Nr. 11 (11.11.2019): 1330. http://dx.doi.org/10.3390/electronics8111330.
Der volle Inhalt der QuelleShah, Sabir, Asim Munir, Abdul Waheed, Amerah Alabrah, Muaadh Mukred, Farhan Amin und Abdu Salam. „Enhancing Security and Efficiency in Underwater Wireless Sensor Networks: A Lightweight Key Management Framework“. Symmetry 15, Nr. 8 (27.07.2023): 1484. http://dx.doi.org/10.3390/sym15081484.
Der volle Inhalt der QuelleShen, Xieyang, Chuanhe Huang, Wenxin Pu und Danxin Wang. „A Lightweight Authentication with Dynamic Batch-Based Group Key Management Using LSTM in VANET“. Security and Communication Networks 2022 (03.03.2022): 1–11. http://dx.doi.org/10.1155/2022/9779670.
Der volle Inhalt der QuelleHaas, Jason J., Yih-Chun Hu und Kenneth P. Laberteaux. „Efficient Certificate Revocation List Organization and Distribution“. IEEE Journal on Selected Areas in Communications 29, Nr. 3 (März 2011): 595–604. http://dx.doi.org/10.1109/jsac.2011.110309.
Der volle Inhalt der QuelleHwang, Gwan-Hwan, Tao-Ku Chang und Hung-Wen Chiang. „A Semidecentralized PKI System Based on Public Blockchains with Automatic Indemnification Mechanism“. Security and Communication Networks 2021 (31.10.2021): 1–15. http://dx.doi.org/10.1155/2021/7400466.
Der volle Inhalt der QuelleVamshi krishna, H., und Gandharba Swain. „Identification and Avoidance of Malicious Nodes by using Certificate Revocation Method“. International Journal of Engineering & Technology 7, Nr. 4.7 (27.09.2018): 152. http://dx.doi.org/10.14419/ijet.v7i4.7.20533.
Der volle Inhalt der QuelleDissertationen zum Thema "Certificate revocation list, CRL"
Adja, Elloh. „Définition et conception d'un système optimal de la révocation de certificats“. Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAT012.
Der volle Inhalt der QuelleThe Public Key Infrastructure (PKI) is a public key infrastructure whose objective is to meet needs such as public key authentication, access control and authorization functions. The support for these services determines the attributes contained in, as well as auxiliary control information such as policy and certification path constraints. The validation of the certificate goes through the verification of these attributes. A certificate is supposed to be used throughout its validity period. However, various circumstances may interrupt this validity. These circumstances include a name change, an association change, etc. Under such circumstances, the CA must revoke the certificate. Certificate revocation validation and verification services are expected or necessary in several contexts, we can cite some among many others: vehicular communications, (WWW), user authentication, etc. Vehicle communications are at the center of the vehicles of tomorrow and, more generally, of smart cities. Securing these communications is a critical element given the services in perspective. The security of inter-vehicle exchanges is based on the digital signature. This signature requires a key exchange infrastructure (PKI).RFC 5280 defines different revocation methods. Among these, we have a revocation method, which requires the periodic publication by the CA of a signed data structure called CRL (Certificate revocation list). This approach, which is the most widely used, is mature but expensive in terms of time and volume, and vehicular communications bring new constraints. This work relates to the verification of the revocation of X509 certificates and pseudonym certificates used in vehicular communications. Our goal is to reduce latency due to revocation checking of X509 and pseudonyms certificates. In this context, we have proposed a method of revocation, which implies the publication of the revocation lists in a public Blockchain. We then proposed a revocation method able to face the new constraints introduced by the vehicular environment. Our contributions have been validated by an implementation
Hockmann, Volker. „Developing a concept for handling IT security with secured and trusted electronic connections“. Thesis, University of Wolverhampton, 2014. http://hdl.handle.net/2436/324189.
Der volle Inhalt der QuelleAmoozadeh, Mani. „Certificate Revocation List Distribution in Vehicular Communication Systems“. Thesis, KTH, Kommunikationsnät, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-119818.
Der volle Inhalt der QuelleNowatkowski, Michael E. „Certificate revocation list distribution in vehicular ad hoc networks“. Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33971.
Der volle Inhalt der QuelleZhang, Qingwei. „Towards Efficient Certificate Revocation Status Validation in Vehicular Ad Hoc Networks with Data Mining“. Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/23543.
Der volle Inhalt der QuelleYAN, CHIH-HAO, und 鄢志豪. „A Strategy of Fast Access to Certificate Revocation List on Certificate Authority“. Thesis, 2001. http://ndltd.ncl.edu.tw/handle/z75994.
Der volle Inhalt der QuelleBuchteile zum Thema "Certificate revocation list, CRL"
Nowatkowski, Michael, Chris McManus, Jennie Wolfgang und Henry Owen. „Cooperative Certificate Revocation List Distribution Methods in VANETs“. In Ad Hoc Networks, 652–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11723-7_44.
Der volle Inhalt der QuellePo Cheong, Chi. „A Simple and Secure Credit Card-Based Payment System“. In Encyclopedia of Multimedia Technology and Networking, Second Edition, 1299–306. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch175.
Der volle Inhalt der QuellePo Cheong, Chi. „A Simple and Secure Credit Card-Based Payment System“. In Electronic Services, 834–42. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-967-5.ch051.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Certificate revocation list, CRL"
Laberteaux, Kenneth P., Jason J. Haas und Yih-Chun Hu. „Security certificate revocation list distribution for vanet“. In the fifth ACM international workshop. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1410043.1410063.
Der volle Inhalt der QuelleKumar, Harshit, und Dinesh Singh. „Smart Certificate Revocation List Exchange in VANET“. In 2020 12th International Conference on Computational Intelligence and Communication Networks (CICN). IEEE, 2020. http://dx.doi.org/10.1109/cicn49253.2020.9242643.
Der volle Inhalt der QuellePapadimitratos, Panagiotis (Panos), Ghita Mezzour und Jean-Pierre Hubaux. „Certificate revocation list distribution in vehicular communication systems“. In the fifth ACM international workshop. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1410043.1410062.
Der volle Inhalt der QuelleRigazzi, Giovanni, Andrea Tassi, Robert J. Piechocki, Theo Tryfonas und Andrew Nix. „Optimized Certificate Revocation List Distribution for Secure V2X Communications“. In 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall). IEEE, 2017. http://dx.doi.org/10.1109/vtcfall.2017.8288287.
Der volle Inhalt der QuelleDuan, Li, Yong Li und Lijun Liao. „Flexible certificate revocation list for efficient authentication in IoT“. In IOT '18: 8th International Conference on the Internet of Things. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3277593.3277595.
Der volle Inhalt der QuelleOzcelik, Ilker, und Anthony Skjellum. „CryptoRevocate: A Cryptographic Accumulator based Distributed Certificate Revocation List“. In 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2021. http://dx.doi.org/10.1109/ccwc51732.2021.9376112.
Der volle Inhalt der QuelleKondareddy, Yogesh, Giovanni Di Crescenzo und Prathima Agrawal. „Analysis of Certificate Revocation List Distribution Protocols for Vehicular Networks“. In GLOBECOM 2010 - 2010 IEEE Global Communications Conference. IEEE, 2010. http://dx.doi.org/10.1109/glocom.2010.5683985.
Der volle Inhalt der QuelleMichael, E. Nowatkowski, und L. Owen Henry. „Scalable certificate revocation list distribution in vehicular ad hoc networks“. In 2010 Ieee Globecom Workshops. IEEE, 2010. http://dx.doi.org/10.1109/glocomw.2010.5700380.
Der volle Inhalt der QuelleTuladhar, Kastuv M., und Kiho Lim. „Efficient and Scalable Certificate Revocation List Distribution in Hierarchical VANETs“. In 2018 IEEE International Conference on Electro/Information Technology (EIT). IEEE, 2018. http://dx.doi.org/10.1109/eit.2018.8500150.
Der volle Inhalt der QuelleNowatkowski, Michael E., und Henry L. Owen. „Certificate revocation list distribution in VANETs using Most Pieces Broadcast“. In SOUTHEASTCON 2010. IEEE, 2010. http://dx.doi.org/10.1109/secon.2010.5453881.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Certificate revocation list, CRL"
Solinas, J., und L. Zieglar. Suite B Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, Januar 2010. http://dx.doi.org/10.17487/rfc5759.
Der volle Inhalt der QuelleHousley, R., W. Polk, W. Ford und D. Solo. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, April 2002. http://dx.doi.org/10.17487/rfc3280.
Der volle Inhalt der QuelleCooper, D., S. Santesson, S. Farrell, S. Boeyen, R. Housley und W. Polk. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, Mai 2008. http://dx.doi.org/10.17487/rfc5280.
Der volle Inhalt der QuelleJenkins, M., und L. Zieglar. Commercial National Security Algorithm (CNSA) Suite Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, Mai 2019. http://dx.doi.org/10.17487/rfc8603.
Der volle Inhalt der QuelleYee, P. Updates to the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, Januar 2013. http://dx.doi.org/10.17487/rfc6818.
Der volle Inhalt der QuelleSantesson, S., und R. Housley. Internet X.509 Public Key Infrastructure Authority Information Access Certificate Revocation List (CRL) Extension. RFC Editor, Dezember 2005. http://dx.doi.org/10.17487/rfc4325.
Der volle Inhalt der QuelleBassham, L., W. Polk und R. Housley. Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, April 2002. http://dx.doi.org/10.17487/rfc3279.
Der volle Inhalt der QuelleHousley, R., und S. Santesson. Update to DirectoryString Processing in the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, August 2006. http://dx.doi.org/10.17487/rfc4630.
Der volle Inhalt der QuelleSchaad, J., B. Kaliski und R. Housley. Additional Algorithms and Identifiers for RSA Cryptography for use in the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, Juni 2005. http://dx.doi.org/10.17487/rfc4055.
Der volle Inhalt der QuelleJenkins, M., und S. Turner. Secure Object Delivery Protocol (SODP) Server Interfaces: NSA's Profile for Delivery of Certificates, Certificate Revocation Lists (CRLs), and Symmetric Keys to Clients. RFC Editor, April 2022. http://dx.doi.org/10.17487/rfc9152.
Der volle Inhalt der Quelle