搜索结果: 1-15 共查到“certificates”相关记录25条 . 查询时间(0.102 秒)
Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge
non-uniform certificates concurrent zero-knowledge
font style='font-size:12px;'>
2019/6/4
We introduce the notion of non-uniformly sound certificates: succinct single-message (unidirectional) argument systems that satisfy a ``best-possible security'' against non-uniform polynomial-time att...
Privacy-preserving linkage/revocation of VANET certificates without LAs
Vehicular communications Security Security credential management system (SCMS)
font style='font-size:12px;'>
2018/9/6
Vehicular communication (V2X) technologies are expected to be common in the future, providing better transportation safety and efficiency. However, their large-scale deployment requires addressing som...
ACPC: Efficient revocation of pseudonym certificates using activation codes
Vehicular communications certificate revocation activation codes
font style='font-size:12px;'>
2018/4/10
Vehicular communication (V2X) technologies allow vehicles to exchange information about the road conditions and their own status, and thereby enhance transportation safety and efficiency. For broader ...
A privacy-preserving method for temporarily linking/revoking pseudonym certificates in vehicular networks
Vehicular communications security Security Credential Management System (SCMS)
font style='font-size:12px;'>
2018/3/6
Vehicular communication (V2X) technologies are expected to become increasingly common in the future. Although they enable improvements on transportation safety and efficiency, the large scale deployme...
The Viability of Post-quantum X.509 Certificates
post-quantum certificates hybrid certificates hash-based certificates
font style='font-size:12px;'>
2018/1/19
If quantum computers were built, they would pose concerns for public key cryptography as we know it. Among other cryptographic techniques, they would jeopardize the use of PKI X.509 certificates (RSA,...
Encrypting Messages for Incomplete Chains of Certificates
key management PKI web of trust
font style='font-size:12px;'>
2017/8/17
A public key infrastructure (PKI) binds public keys to the identities of their respective owners. It employs certificate authorities or a web of trust over social links to transitively build cryptogra...
Activate Later Certificates for V2X -- Combining ITS efficiency with privacy
deniability of implicit certificates elliptic curve cryptography ITS
font style='font-size:12px;'>
2016/12/23
We specify Issue First Activate Later (IFAL). This is an ETSI type of V2X Public Key Infrastructure based on short-lived pseudonymous certificates without Certificate Revocation Lists. IFAL certificat...
Consistency of Age Reporting on Death Certificates and Social Security Administration Records among Elderly African-American Decedents
African-Americans death certificate age reporting vital statistics Social Security Administration
font style='font-size:12px;'>
2016/3/18
This paper investigates the quality of age reporting in vital statistics and Social Security/Medicare data among elderly African-Americans. The authors examine whether the deathcertificate or Social S...
Researchers Find Vulnerabilities in Use of Certificates for Web Security
Researchers Vulnerabilities in Use of Certificates Web Security
font style='font-size:12px;'>
2015/11/12
Consumers use the Internet for banking, emailing, shopping and much more nowadays. With so much personal and private information being transmitted over the Web, Internet users must be able to rely on ...
Proposal of new outperformance certificates in agricultural market
capped reverse outperformace certifi cate commodity vanilla options
font style='font-size:12px;'>
2015/10/9
Th e paper analyses new structured fi nancial products in agricultural market with the aim to gain in the declining
trends. Th ere are presented the reverse outperformance and the capped rever...
A Method for Fast Revocation of Public Key Certificates and Security Capabilities
Public Key Certificate Security Capabilities
font style='font-size:12px;'>
2015/8/5
We present a new approach to fast certificate revocation centered around the concept of an on-line semi-trusted mediator (SEM). The use of a SEM in conjunction with a simple threshold variant of the R...
The most dangerous code in the world: validating SSL certificates in non-browser software
non-browser software validating SSL
font style='font-size:12px;'>
2015/8/5
SSL (Secure Sockets Layer) is the de facto standard for secure Internet communications. Security of SSL connections against an active network attacker depends on correctly validating public-key certif...
Towards Short-Lived Certificates
Short-Lived Certificates OCSP
font style='font-size:12px;'>
2015/8/5
The Online Certificate Status Protocol (OCSP) is as good as dead. It imposes a massive performance penalty on web traffic and has failed to mitigate the recent high-profile certificate security breach...
The case for prefetching and prevalidating TLS server certificates
TLS server certificates prefetching
font style='font-size:12px;'>
2015/8/5
A key bottleneck in a full TLS handshake is the need to fetch and validate the server certificate before a secure connection can be established. We propose a mechanism by which a browser can prefetch ...
Temporal trends in recording of diabetes on death certificates: results from Translating Research Into Action for Diabetes (TRIAD)
diabetes death certificates cause of death managed care programs
font style='font-size:12px;'>
2014/12/11
OBJECTIVE: To determine the frequency that diabetes is reported on death certificates of decedents with known diabetes and describe trends in reporting over 8 years. RESEARCH DESIGN AND METHODS: Data ...