Gotowa bibliografia na temat „Certificate revocation list, CRL”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Certificate revocation list, CRL”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Certificate revocation list, CRL"
Riad, Khaled, i Mohamed Elhoseny. "A Blockchain-Based Key-Revocation Access Control for Open Banking". Wireless Communications and Mobile Computing 2022 (31.01.2022): 1–14. http://dx.doi.org/10.1155/2022/3200891.
Pełny tekst źródłaDenny, Deljo, i Kukatlapalli Pradeep Kumar. "Secure Authenticated Communication Via Digital Signature and Clear List in VANETs". ECS Transactions 107, nr 1 (24.04.2022): 20065–71. http://dx.doi.org/10.1149/10701.20065ecst.
Pełny tekst źródłaZhao, Cong, Jiayu Qi, Tianhan Gao i Xinyang Deng. "IMF-PR: An Improved Morton-Filter-Based Pseudonym-Revocation Scheme in VANETs". Sensors 23, nr 8 (18.04.2023): 4066. http://dx.doi.org/10.3390/s23084066.
Pełny tekst źródłaMahmood, Shahid, Moneeb Gohar, Jin-Ghoo Choi, Seok-Joo Koh, Hani Alquhayz i Murad Khan. "Digital Certificate Verification Scheme for Smart Grid using Fog Computing (FONICA)". Sustainability 13, nr 5 (26.02.2021): 2549. http://dx.doi.org/10.3390/su13052549.
Pełny tekst źródłaLim, Kiho, Weihua Liu, Xiwei Wang i Jingon Joung. "SSKM: Scalable and Secure Key Management Scheme for Group Signature Based Authentication and CRL in VANET". Electronics 8, nr 11 (11.11.2019): 1330. http://dx.doi.org/10.3390/electronics8111330.
Pełny tekst źródłaShah, Sabir, Asim Munir, Abdul Waheed, Amerah Alabrah, Muaadh Mukred, Farhan Amin i Abdu Salam. "Enhancing Security and Efficiency in Underwater Wireless Sensor Networks: A Lightweight Key Management Framework". Symmetry 15, nr 8 (27.07.2023): 1484. http://dx.doi.org/10.3390/sym15081484.
Pełny tekst źródłaShen, Xieyang, Chuanhe Huang, Wenxin Pu i Danxin Wang. "A Lightweight Authentication with Dynamic Batch-Based Group Key Management Using LSTM in VANET". Security and Communication Networks 2022 (3.03.2022): 1–11. http://dx.doi.org/10.1155/2022/9779670.
Pełny tekst źródłaHaas, Jason J., Yih-Chun Hu i Kenneth P. Laberteaux. "Efficient Certificate Revocation List Organization and Distribution". IEEE Journal on Selected Areas in Communications 29, nr 3 (marzec 2011): 595–604. http://dx.doi.org/10.1109/jsac.2011.110309.
Pełny tekst źródłaHwang, Gwan-Hwan, Tao-Ku Chang i Hung-Wen Chiang. "A Semidecentralized PKI System Based on Public Blockchains with Automatic Indemnification Mechanism". Security and Communication Networks 2021 (31.10.2021): 1–15. http://dx.doi.org/10.1155/2021/7400466.
Pełny tekst źródłaVamshi krishna, H., i Gandharba Swain. "Identification and Avoidance of Malicious Nodes by using Certificate Revocation Method". International Journal of Engineering & Technology 7, nr 4.7 (27.09.2018): 152. http://dx.doi.org/10.14419/ijet.v7i4.7.20533.
Pełny tekst źródłaRozprawy doktorskie na temat "Certificate revocation list, CRL"
Adja, Elloh. "Définition et conception d'un système optimal de la révocation de certificats". Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAT012.
Pełny tekst źródłaThe Public Key Infrastructure (PKI) is a public key infrastructure whose objective is to meet needs such as public key authentication, access control and authorization functions. The support for these services determines the attributes contained in, as well as auxiliary control information such as policy and certification path constraints. The validation of the certificate goes through the verification of these attributes. A certificate is supposed to be used throughout its validity period. However, various circumstances may interrupt this validity. These circumstances include a name change, an association change, etc. Under such circumstances, the CA must revoke the certificate. Certificate revocation validation and verification services are expected or necessary in several contexts, we can cite some among many others: vehicular communications, (WWW), user authentication, etc. Vehicle communications are at the center of the vehicles of tomorrow and, more generally, of smart cities. Securing these communications is a critical element given the services in perspective. The security of inter-vehicle exchanges is based on the digital signature. This signature requires a key exchange infrastructure (PKI).RFC 5280 defines different revocation methods. Among these, we have a revocation method, which requires the periodic publication by the CA of a signed data structure called CRL (Certificate revocation list). This approach, which is the most widely used, is mature but expensive in terms of time and volume, and vehicular communications bring new constraints. This work relates to the verification of the revocation of X509 certificates and pseudonym certificates used in vehicular communications. Our goal is to reduce latency due to revocation checking of X509 and pseudonyms certificates. In this context, we have proposed a method of revocation, which implies the publication of the revocation lists in a public Blockchain. We then proposed a revocation method able to face the new constraints introduced by the vehicular environment. Our contributions have been validated by an implementation
Hockmann, Volker. "Developing a concept for handling IT security with secured and trusted electronic connections". Thesis, University of Wolverhampton, 2014. http://hdl.handle.net/2436/324189.
Pełny tekst źródłaAmoozadeh, Mani. "Certificate Revocation List Distribution in Vehicular Communication Systems". Thesis, KTH, Kommunikationsnät, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-119818.
Pełny tekst źródłaNowatkowski, Michael E. "Certificate revocation list distribution in vehicular ad hoc networks". Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33971.
Pełny tekst źródłaZhang, Qingwei. "Towards Efficient Certificate Revocation Status Validation in Vehicular Ad Hoc Networks with Data Mining". Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/23543.
Pełny tekst źródłaYAN, CHIH-HAO, i 鄢志豪. "A Strategy of Fast Access to Certificate Revocation List on Certificate Authority". Thesis, 2001. http://ndltd.ncl.edu.tw/handle/z75994.
Pełny tekst źródłaCzęści książek na temat "Certificate revocation list, CRL"
Nowatkowski, Michael, Chris McManus, Jennie Wolfgang i Henry Owen. "Cooperative Certificate Revocation List Distribution Methods in VANETs". W Ad Hoc Networks, 652–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11723-7_44.
Pełny tekst źródłaPo Cheong, Chi. "A Simple and Secure Credit Card-Based Payment System". W Encyclopedia of Multimedia Technology and Networking, Second Edition, 1299–306. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch175.
Pełny tekst źródłaPo Cheong, Chi. "A Simple and Secure Credit Card-Based Payment System". W Electronic Services, 834–42. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-967-5.ch051.
Pełny tekst źródłaStreszczenia konferencji na temat "Certificate revocation list, CRL"
Laberteaux, Kenneth P., Jason J. Haas i Yih-Chun Hu. "Security certificate revocation list distribution for vanet". W the fifth ACM international workshop. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1410043.1410063.
Pełny tekst źródłaKumar, Harshit, i Dinesh Singh. "Smart Certificate Revocation List Exchange in VANET". W 2020 12th International Conference on Computational Intelligence and Communication Networks (CICN). IEEE, 2020. http://dx.doi.org/10.1109/cicn49253.2020.9242643.
Pełny tekst źródłaPapadimitratos, Panagiotis (Panos), Ghita Mezzour i Jean-Pierre Hubaux. "Certificate revocation list distribution in vehicular communication systems". W the fifth ACM international workshop. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1410043.1410062.
Pełny tekst źródłaRigazzi, Giovanni, Andrea Tassi, Robert J. Piechocki, Theo Tryfonas i Andrew Nix. "Optimized Certificate Revocation List Distribution for Secure V2X Communications". W 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall). IEEE, 2017. http://dx.doi.org/10.1109/vtcfall.2017.8288287.
Pełny tekst źródłaDuan, Li, Yong Li i Lijun Liao. "Flexible certificate revocation list for efficient authentication in IoT". W IOT '18: 8th International Conference on the Internet of Things. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3277593.3277595.
Pełny tekst źródłaOzcelik, Ilker, i Anthony Skjellum. "CryptoRevocate: A Cryptographic Accumulator based Distributed Certificate Revocation List". W 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2021. http://dx.doi.org/10.1109/ccwc51732.2021.9376112.
Pełny tekst źródłaKondareddy, Yogesh, Giovanni Di Crescenzo i Prathima Agrawal. "Analysis of Certificate Revocation List Distribution Protocols for Vehicular Networks". W GLOBECOM 2010 - 2010 IEEE Global Communications Conference. IEEE, 2010. http://dx.doi.org/10.1109/glocom.2010.5683985.
Pełny tekst źródłaMichael, E. Nowatkowski, i L. Owen Henry. "Scalable certificate revocation list distribution in vehicular ad hoc networks". W 2010 Ieee Globecom Workshops. IEEE, 2010. http://dx.doi.org/10.1109/glocomw.2010.5700380.
Pełny tekst źródłaTuladhar, Kastuv M., i Kiho Lim. "Efficient and Scalable Certificate Revocation List Distribution in Hierarchical VANETs". W 2018 IEEE International Conference on Electro/Information Technology (EIT). IEEE, 2018. http://dx.doi.org/10.1109/eit.2018.8500150.
Pełny tekst źródłaNowatkowski, Michael E., i Henry L. Owen. "Certificate revocation list distribution in VANETs using Most Pieces Broadcast". W SOUTHEASTCON 2010. IEEE, 2010. http://dx.doi.org/10.1109/secon.2010.5453881.
Pełny tekst źródłaRaporty organizacyjne na temat "Certificate revocation list, CRL"
Solinas, J., i L. Zieglar. Suite B Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, styczeń 2010. http://dx.doi.org/10.17487/rfc5759.
Pełny tekst źródłaHousley, R., W. Polk, W. Ford i D. Solo. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, kwiecień 2002. http://dx.doi.org/10.17487/rfc3280.
Pełny tekst źródłaCooper, D., S. Santesson, S. Farrell, S. Boeyen, R. Housley i W. Polk. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, maj 2008. http://dx.doi.org/10.17487/rfc5280.
Pełny tekst źródłaJenkins, M., i L. Zieglar. Commercial National Security Algorithm (CNSA) Suite Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, maj 2019. http://dx.doi.org/10.17487/rfc8603.
Pełny tekst źródłaYee, P. Updates to the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, styczeń 2013. http://dx.doi.org/10.17487/rfc6818.
Pełny tekst źródłaSantesson, S., i R. Housley. Internet X.509 Public Key Infrastructure Authority Information Access Certificate Revocation List (CRL) Extension. RFC Editor, grudzień 2005. http://dx.doi.org/10.17487/rfc4325.
Pełny tekst źródłaBassham, L., W. Polk i R. Housley. Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, kwiecień 2002. http://dx.doi.org/10.17487/rfc3279.
Pełny tekst źródłaHousley, R., i S. Santesson. Update to DirectoryString Processing in the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, sierpień 2006. http://dx.doi.org/10.17487/rfc4630.
Pełny tekst źródłaSchaad, J., B. Kaliski i R. Housley. Additional Algorithms and Identifiers for RSA Cryptography for use in the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC Editor, czerwiec 2005. http://dx.doi.org/10.17487/rfc4055.
Pełny tekst źródłaJenkins, M., i S. Turner. Secure Object Delivery Protocol (SODP) Server Interfaces: NSA's Profile for Delivery of Certificates, Certificate Revocation Lists (CRLs), and Symmetric Keys to Clients. RFC Editor, kwiecień 2022. http://dx.doi.org/10.17487/rfc9152.
Pełny tekst źródła