Academic literature on the topic 'Implicit certificates'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Implicit certificates.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Implicit certificates"
Kwon, Hee-Yong, and Mun-Kyu Lee. "Fast Verification of Signatures With Shared ECQV Implicit Certificates." IEEE Transactions on Vehicular Technology 68, no. 5 (May 2019): 4680–94. http://dx.doi.org/10.1109/tvt.2019.2902382.
Full textSiddhartha, Valmiki, Gurjot Singh Gaba, and Lavish Kansal. "A Lightweight Authentication Protocol using Implicit Certificates for Securing IoT Systems." Procedia Computer Science 167 (2020): 85–96. http://dx.doi.org/10.1016/j.procs.2020.03.185.
Full textEldefrawy, Mohamed H., Nuno Pereira, and Mikael Gidlund. "Key Distribution Protocol for Industrial Internet of Things Without Implicit Certificates." IEEE Internet of Things Journal 6, no. 1 (February 2019): 906–17. http://dx.doi.org/10.1109/jiot.2018.2865212.
Full textTeniou, Ahcene, and Boucif A. Bensaber. "Efficient and dynamic elliptic curve qu-vanstone implicit certificates distribution scheme for vehicular cloud networks." Security and Privacy 1, no. 1 (January 2018): e11. http://dx.doi.org/10.1002/spy2.11.
Full textMcCord, Michael, Martin Haran, Peadar Davis, and John McCord. "Energy performance certificates and house prices: a quantile regression approach." Journal of European Real Estate Research 13, no. 3 (August 31, 2020): 409–34. http://dx.doi.org/10.1108/jerer-06-2020-0033.
Full textRana, Muhammad, and Quazi Mamun. "A Robust and Lightweight Key Management Protocol for WSNs in Distributed IoT Applications." International Journal of Systems and Software Security and Protection 9, no. 4 (October 2018): 1–16. http://dx.doi.org/10.4018/ijsssp.2018100101.
Full textFlores, Marcel, Andrew Kahn, Marc Warrior, Alan Mislove, and Aleksandar Kuzmanovic. "Utilizing Web Trackers for Sybil Defense." ACM Transactions on the Web 15, no. 2 (May 2021): 1–19. http://dx.doi.org/10.1145/3450444.
Full textSmith, Jessica. "Tracing lines in the lawscape: Registration/pilgrimage and the sacred/secular of law/space." Sociological Review 68, no. 5 (April 21, 2020): 917–31. http://dx.doi.org/10.1177/0038026120915705.
Full textXu, Hai Lin, and Yang Lu. "Hierarchical Certificate-Based Encryption: Definition and an Efficient Construction." Applied Mechanics and Materials 513-517 (February 2014): 1971–74. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1971.
Full textPoulter, Jim. "A birth certificate is not a biological property title: Has an insidiously persistent idea finally reached its use-by date?" Children Australia 32, no. 1 (2007): 37–42. http://dx.doi.org/10.1017/s1035077200011457.
Full textDissertations / Theses on the topic "Implicit certificates"
Porambage, P. (Pawani). "Lightweight authentication and key management of wireless sensor networks for Internet of things." Doctoral thesis, Oulun yliopisto, 2018. http://urn.fi/urn:isbn:9789526219950.
Full textTiivistelmä Esineiden internet (IoT) on viime aikoina yleistynyt konsepti älykkäiden objektien (smart objects) liittämiseksi internetiin käyttämällä erilaisia verkko- ja kommunikaatioteknologioita. Olennaisimpia esineiden internetin pohjalla toimivia teknologioita ovat langattomat sensoriverkot (WSN), jotka ovat esineiden internetin perusrakennuspalikoita. Esineiden internetiin kytketyt langattomat sensoriverkot mahdollistavat laajan joukon erilaisia sovelluksia, kuten älykodit, etäterveydenhuollon, älykkäät kaupungit sekä älykkäät teollisuuden sovellukset. Langattomien sensoriverkkojen ja esineiden internetin yhdistäminen tuo mukanaan myös tietoturvaan liittyviä haasteita, sillä laskentateholtaan yleensä heikot anturit ja toimilaitteet eivät kykene kovin vaativiin tietoturvaoperaatioihin, joihin lukeutuvat mm. tietoturva-avaimen muodostus ja käyttäjäntunnistus. Tässä väitöskirjassa pyritään vastaamaan haasteeseen käyttämällä kevyitä avaimenmuodostus- ja käyttäjäntunnistusratkaisuja esineiden internetiin kytketyissä resurssirajoitetuissa sensoriverkoissa. Väitöstutkimuksessa keskitytään aluksi implisiittisten sertifikaattien käyttöön tietoturvallisten end-to-end-kommunikaatiokanavien alustamisessa resurssirajoitettujen sensori- ja muiden IoT-laitteiden välillä. Implisiittisiä sertifikaatteja käytetään käyttäjäntunnistuksessa sekä avaimenmuodostuksessa. Kehitettyjen ratkaisujen soveltuvuus tarkoitukseen osoitetaan suorituskykymittauksilla sekä vertaamalla niiden tietoturvaomi- naisuuksia. Seuraavaksi väitöskirjassa esitellään kaksi kevyttä ryhmäavaimenmuodostus- protokollaa tietoturvalliseen ryhmäkommunikaatioon resurssirajoitettujen IoT-laitteiden välillä. Lopuksi väitöskirjassa tarkastellaan lupaavia lähestymistapoja olemassa olevien tietoturvaprotokollien räätäläintiin IoT-laitteiden ja -verkkojen ominaisuuksille sopiviksi. Erityistä huomiota kiinnitetään Host Identity -protokollan (HIP) eri versioiden käyttöön dynaamisten ja tietoturvallisten end-to-end-yhteyksien luomiseen toisilleen ennestään tuntemattomien erityyppisten IoT-laitteiden välillä, joiden laitteistoresurssiprofiilit voivat olla hyvin erilaiset. Väitöskirjan keskeinen tulos on väitöskirjatyössä kehitetty Colla- borative HIP (CHIP) -protokolla, joka on resurssitehokas avaimenmuodostusteknologia resurssirajoitetuille IoT-laitteille. Kehitetyn teknologian soveltuvuutta tarkoitukseensa demonstroidaan prototyyppitoteutuksella tehtyjen suorituskykymittausten avulla
Huang, Zhen-Zong, and 黃振宗. "Traceable Alias Protocol based on Implicit Certificates." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/27838849136842262869.
Full text義守大學
資訊工程學系
102
Internet has already becomes part of most human’s life rapidly.Deal to the characteristic of anonymity and flexibility, Internet has tremendous potential and a lot to offer in terms of services. It is also an indispensable business tool, which all kind of the information can be shared world-wide.Internet makes positive social improvement.There are also growing concerns about media security, privacy and other related internet crime which the users are taking advantage of the anonymity of the Internet. In order to providea safe and convenient Internet environment, our research proposed the idea of implicit certificates which aims to strike a balance between Real-Identity and Anonymity by combining digital signatures and digital certificates mechanism.Therefore, the possibility of faking identity will be significantly deceased; meanwhile, it could keep certain degree of anonymity. The user’s identity could be reveal using specific procedures when conflicts arise.
Book chapters on the topic "Implicit certificates"
Hyla, Tomasz, Witold Maćków, and Jerzy Pejaś. "Implicit and Explicit Certificates-Based Encryption Scheme." In Computer Information Systems and Industrial Management, 651–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-45237-0_59.
Full textCaubet, Juan, Oscar Esparza, Juanjo Alins, Jorge Mata-Díaz, and Miguel Soriano. "Securing Identity Assignment Using Implicit Certificates in P2P Overlays." In Trust Management VII, 151–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38323-6_11.
Full textKwon, Hee-Yong, and Mun-Kyu Lee. "Fast Signature Verification with Shared Implicit Certificates for Vehicular Communication." In Advances on Broad-Band Wireless Computing, Communication and Applications, 525–33. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49106-6_52.
Full textStinson, Douglas R., and Reto Strobl. "Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates." In Information Security and Privacy, 417–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-47719-5_33.
Full textHyla, Tomasz, and Jerzy Pejaś. "A Signature Scheme Based on Implicit and Explicit Certificates Against k-Traitors Collusion Attack." In Computer Information Systems and Industrial Management, 638–51. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59105-6_55.
Full textYum, Dae Hyun, and Pil Joong Lee. "Separable Implicit Certificate Revocation." In Lecture Notes in Computer Science, 121–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11496618_10.
Full textBrown, Daniel R. L., Robert Gallant, and Scott A. Vanstone. "Provably Secure Implicit Certificate Schemes." In Financial Cryptography, 156–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-46088-8_15.
Full textBittl, Sebastian, Berke Aydinli, and Karsten Roscher. "Effective Certificate Distribution in ETSI ITS VANETs Using Implicit and Explicit Requests." In Lecture Notes in Computer Science, 72–83. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-17765-6_7.
Full textLee, Cheng-Chi, Min-Shiang Hwang, and I.-En Liao. "On the Security of Self-Certified Public Keys." In Privacy Solutions and Security Frameworks in Information Protection, 124–30. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2050-6.ch008.
Full textConference papers on the topic "Implicit certificates"
Huang, Wanling, Jingqiang Lin, Qiongxiao Wang, Yajun Teng, Huiqing Wan, and Wei Wang. "Certificate Transparency for ECQV Implicit Certificates." In ICC 2021 - IEEE International Conference on Communications. IEEE, 2021. http://dx.doi.org/10.1109/icc42927.2021.9500380.
Full textSciancalepore, Savio, Angelo Capossele, Giuseppe Piro, Gennaro Boggia, and Giuseppe Bianchi. "Key Management Protocol with Implicit Certificates for IoT systems." In MobiSys'15: The 13th Annual International Conference on Mobile Systems, Applications, and Services. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2753476.2753477.
Full textPollicino, Francesco, Dario Stabili, Luca Ferretti, and Mirco Marchetti. "An experimental analysis of ECQV implicit certificates performance in VANETs." In 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall). IEEE, 2020. http://dx.doi.org/10.1109/vtc2020-fall49728.2020.9348712.
Full textRabadi, Nader M. "Implicit certificates support in IEEE 1609 security services for Wireless Access in Vehicular Environment (WAVE)." In 2010 IEEE 7th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS). IEEE, 2010. http://dx.doi.org/10.1109/mass.2010.5663900.
Full textHa, Duy An, Kha Tho Nguyen, and John K. Zao. "Efficient authentication of resource-constrained IoT devices based on ECQV implicit certificates and datagram transport layer security protocol." In SoICT '16: Seventh International Symposium on Information and Communication Technology. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/3011077.3011108.
Full textRabadi, Nader M. "Anonymous Group Implicit Certificate Scheme." In 2010 7th IEEE Consumer Communications and Networking Conference (CCNC). IEEE, 2010. http://dx.doi.org/10.1109/ccnc.2010.5421785.
Full textRabadi, Nader M. "Improved anonymous group implicit certificate scheme." In 2011 IEEE Consumer Communications and Networking Conference (CCNC). IEEE, 2011. http://dx.doi.org/10.1109/ccnc.2011.5766479.
Full textRabadi, Nader M. "Revised self-certified implicit certificate scheme for anonymous communications in vehicular networks." In 2010 IEEE Vehicular Networking Conference (IEEE VNC). IEEE, 2010. http://dx.doi.org/10.1109/vnc.2010.5698269.
Full textRabadi, Nader M. "Self-certified public key implicit certificate scheme for drivers' anonymity in Vehicle-to-Vehicle communication networks." In SOUTHEASTCON 2010. IEEE, 2010. http://dx.doi.org/10.1109/secon.2010.5453848.
Full textBraeken, An, Placide Shabisha, Abdellah Touhafi, and Kris Steenhaut. "Pairing free and implicit certificate based signcryption scheme with proxy re-encryption for secure cloud data storage." In 2017 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech). IEEE, 2017. http://dx.doi.org/10.1109/cloudtech.2017.8284701.
Full text