Al-Janabi et al., 2012 - Google Patents
Development of certificate authority services for web applicationsAl-Janabi et al., 2012
View PDF- Document ID
- 1609335219619836001
- Author
- Al-Janabi S
- Obaid A
- Publication year
- Publication venue
- 2012 International Conference on Future Communication Networks
External Links
Snippet
The most important security services are confidentiality, integrity, authentication, and non- repudiation. When designing a communication system, the security services of this system must be defined. The Public-Key Infrastructure (PKI) is a technology that can meet these …
- 238000000034 method 0 abstract description 12
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12086799B2 (en) | Method and system for zero-knowledge and identity based key management for decentralized applications | |
US8010795B2 (en) | Secure information transfer using dedicated public key pairs | |
US7103911B2 (en) | Identity-based-encryption system with district policy information | |
US7624269B2 (en) | Secure messaging system with derived keys | |
US8656177B2 (en) | Identity-based-encryption system | |
Adams et al. | Understanding PKI: concepts, standards, and deployment considerations | |
US8108678B1 (en) | Identity-based signcryption system | |
US7320073B2 (en) | Secure method for roaming keys and certificates | |
Al-Janabi et al. | Development of certificate authority services for web applications | |
US20140281491A1 (en) | Identity escrow management for minimal disclosure credentials | |
US20040059924A1 (en) | Biometric private key infrastructure | |
Downnard | Public-key cryptography extensions into Kerberos | |
WO2008020991A2 (en) | Notarized federated identity management | |
WO2008066643A2 (en) | Identity management facilitating minimum disclosure of user data | |
Buldas et al. | Keyless signature infrastructure and PKI: hash-tree signatures in pre-and post-quantum world | |
Yeh et al. | Applying lightweight directory access protocol service on session certification authority | |
Persiano et al. | A secure and private system for subscription-based remote services | |
Goodrich et al. | Notarized federated ID management and authentication | |
Goodrich et al. | Notarized federated identity management for web services | |
Wesemeyer et al. | Anonymous Single Sign-on with Proxy Re-Verification | |
Kandepet | An overview of public key infrastructure | |
AU2003253777B2 (en) | Biometric private key infrastructure | |
Kaur | Securing Database using Public Key Infrastructure–A Proposed DB PKI Architecture | |
Komninos | PKI systems | |
Child | Trust Negotiation Using Hidden Credentials |