[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Al-Janabi et al., 2012 - Google Patents

Development of certificate authority services for web applications

Al-Janabi et al., 2012

View PDF
Document ID
1609335219619836001
Author
Al-Janabi S
Obaid A
Publication year
Publication venue
2012 International Conference on Future Communication Networks

External Links

Snippet

The most important security services are confidentiality, integrity, authentication, and non- repudiation. When designing a communication system, the security services of this system must be defined. The Public-Key Infrastructure (PKI) is a technology that can meet these …
Continue reading at www.researchgate.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US12086799B2 (en) Method and system for zero-knowledge and identity based key management for decentralized applications
US8010795B2 (en) Secure information transfer using dedicated public key pairs
US7103911B2 (en) Identity-based-encryption system with district policy information
US7624269B2 (en) Secure messaging system with derived keys
US8656177B2 (en) Identity-based-encryption system
Adams et al. Understanding PKI: concepts, standards, and deployment considerations
US8108678B1 (en) Identity-based signcryption system
US7320073B2 (en) Secure method for roaming keys and certificates
Al-Janabi et al. Development of certificate authority services for web applications
US20140281491A1 (en) Identity escrow management for minimal disclosure credentials
US20040059924A1 (en) Biometric private key infrastructure
Downnard Public-key cryptography extensions into Kerberos
WO2008020991A2 (en) Notarized federated identity management
WO2008066643A2 (en) Identity management facilitating minimum disclosure of user data
Buldas et al. Keyless signature infrastructure and PKI: hash-tree signatures in pre-and post-quantum world
Yeh et al. Applying lightweight directory access protocol service on session certification authority
Persiano et al. A secure and private system for subscription-based remote services
Goodrich et al. Notarized federated ID management and authentication
Goodrich et al. Notarized federated identity management for web services
Wesemeyer et al. Anonymous Single Sign-on with Proxy Re-Verification
Kandepet An overview of public key infrastructure
AU2003253777B2 (en) Biometric private key infrastructure
Kaur Securing Database using Public Key Infrastructure–A Proposed DB PKI Architecture
Komninos PKI systems
Child Trust Negotiation Using Hidden Credentials