搜索结果: 1-15 共查到“certificates”相关记录25条 . 查询时间(0.075 秒)
Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge
non-uniform certificates concurrent zero-knowledge
2019/6/4
We introduce the notion of non-uniformly sound certificates: succinct single-message (unidirectional) argument systems that satisfy a ``best-possible security'' against non-uniform polynomial-time att...
Privacy-preserving linkage/revocation of VANET certificates without LAs
Vehicular communications Security Security credential management system (SCMS)
2018/9/6
Vehicular communication (V2X) technologies are expected to be common in the future, providing better transportation safety and efficiency. However, their large-scale deployment requires addressing som...
ACPC: Efficient revocation of pseudonym certificates using activation codes
Vehicular communications certificate revocation activation codes
2018/4/10
Vehicular communication (V2X) technologies allow vehicles to exchange information about the road conditions and their own status, and thereby enhance transportation safety and efficiency. For broader ...
A privacy-preserving method for temporarily linking/revoking pseudonym certificates in vehicular networks
Vehicular communications security Security Credential Management System (SCMS)
2018/3/6
Vehicular communication (V2X) technologies are expected to become increasingly common in the future. Although they enable improvements on transportation safety and efficiency, the large scale deployme...
The Viability of Post-quantum X.509 Certificates
post-quantum certificates hybrid certificates hash-based certificates
2018/1/19
If quantum computers were built, they would pose concerns for public key cryptography as we know it. Among other cryptographic techniques, they would jeopardize the use of PKI X.509 certificates (RSA,...
A public key infrastructure (PKI) binds public keys to the identities of their respective owners. It employs certificate authorities or a web of trust over social links to transitively build cryptogra...
Activate Later Certificates for V2X -- Combining ITS efficiency with privacy
deniability of implicit certificates elliptic curve cryptography ITS
2016/12/23
We specify Issue First Activate Later (IFAL). This is an ETSI type of V2X Public Key Infrastructure based on short-lived pseudonymous certificates without Certificate Revocation Lists. IFAL certificat...
Consistency of Age Reporting on Death Certificates and Social Security Administration Records among Elderly African-American Decedents
African-Americans death certificate age reporting vital statistics Social Security Administration
2016/3/18
This paper investigates the quality of age reporting in vital statistics and Social Security/Medicare data among elderly African-Americans. The authors examine whether the deathcertificate or Social S...
Researchers Find Vulnerabilities in Use of Certificates for Web Security
Researchers Vulnerabilities in Use of Certificates Web Security
2015/11/12
Consumers use the Internet for banking, emailing, shopping and much more nowadays. With so much personal and private information being transmitted over the Web, Internet users must be able to rely on ...
Proposal of new outperformance certificates in agricultural market
capped reverse outperformace certifi cate commodity vanilla options
2015/10/9
Th e paper analyses new structured fi nancial products in agricultural market with the aim to gain in the declining
trends. Th ere are presented the reverse outperformance and the capped rever...
A Method for Fast Revocation of Public Key Certificates and Security Capabilities
Public Key Certificate Security Capabilities
2015/8/5
We present a new approach to fast certificate revocation centered around the concept of an on-line semi-trusted mediator (SEM). The use of a SEM in conjunction with a simple threshold variant of the R...
The most dangerous code in the world: validating SSL certificates in non-browser software
non-browser software validating SSL
2015/8/5
SSL (Secure Sockets Layer) is the de facto standard for secure Internet communications. Security of SSL connections against an active network attacker depends on correctly validating public-key certif...
The Online Certificate Status Protocol (OCSP) is as good as dead. It imposes a massive performance penalty on web traffic and has failed to mitigate the recent high-profile certificate security breach...
The case for prefetching and prevalidating TLS server certificates
TLS server certificates prefetching
2015/8/5
A key bottleneck in a full TLS handshake is the need to fetch and validate the server certificate before a secure connection can be established. We propose a mechanism by which a browser can prefetch ...
Temporal trends in recording of diabetes on death certificates: results from Translating Research Into Action for Diabetes (TRIAD)
diabetes death certificates cause of death managed care programs
2014/12/11
OBJECTIVE: To determine the frequency that diabetes is reported on death certificates of decedents with known diabetes and describe trends in reporting over 8 years. RESEARCH DESIGN AND METHODS: Data ...