Derived certificate based on changing identity
MS Brown, DF Tapuska - US Patent 8,843,740, 2014 - Google Patents
(57) ABSTRACT A first device with a changing identity establishes a secure connection with
a second device in a network by acting as its own certificate authority. The first device issues …
a second device in a network by acting as its own certificate authority. The first device issues …
Trust management for multimedia P2P applications in autonomic networking
In the last years, trust management has become a fundamental basis for facilitating the
cooperation between different users in peer-to-peer (P2P) multimedia applications within …
cooperation between different users in peer-to-peer (P2P) multimedia applications within …
[PDF][PDF] 普适环境中基于身份的跨域认证方案
罗长远, 霍士伟, 邢洪智 - 通信学报, 2011 - infocomm-journal.com
利用椭圆曲线加法群提出了一种基于身份的签名算法, 算法中签名的验证结果相对于签名者身份
是一个常量, 该算法可保证跨域认证中用户身份的匿名性, 并且避免了复杂的双线性对运算 …
是一个常量, 该算法可保证跨域认证中用户身份的匿名性, 并且避免了复杂的双线性对运算 …
Trusted certificate authority to create certificates based on capabilities of processes
MS Brown, DF Tapuska - US Patent 9,026,789, 2015 - Google Patents
BACKGROUND A certificate authority may create for a server a certificate that binds an
identity of the server to a public key of the server using a digital signature of the certificate …
identity of the server to a public key of the server using a digital signature of the certificate …
A virtual bridge certificate authority‐based cross‐domain authentication mechanism for distributed collaborative manufacturing systems
W Zhang, X Wang, MK Khan - Security and Communication …, 2015 - Wiley Online Library
The virtual enterprise (VE) is a new collaborative intelligent manufacturing paradigm that
pools the core competencies of its member enterprises through computer networks to exploit …
pools the core competencies of its member enterprises through computer networks to exploit …
A novel authentication and authorization scheme in P2P networking using location-based privacy
BN Jagdale, JW Bakal - Evolutionary Intelligence, 2022 - Springer
In recent years, peer-to-peer (P2P) network has reached popularity in file sharing as it is a
distributed and decentralized network architecture. As there is no centralized authority, there …
distributed and decentralized network architecture. As there is no centralized authority, there …
基于证书的匿名跨域认证方案
丁永善, 李立新, 李作辉 - 网络与信息安全学报, 2018 - infocomm-journal.com
针对物联网中移动设备的跨域认证问题, 提出一种基于证书的匿名跨域认证方案. 首先, 结合PKI
和IBS 的相关特性, 提出一种基于证书的签名(CBS, certificate based signature) 方案 …
和IBS 的相关特性, 提出一种基于证书的签名(CBS, certificate based signature) 方案 …
An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment
S Shin, T Shon, H Yeh, K Kim - Peer-to-Peer Networking and Applications, 2014 - Springer
With the advent of new generation of mobile access devices such as smartphone and tablet
PC, there is coming a need for ubiquitous collaboration which allows people to access …
PC, there is coming a need for ubiquitous collaboration which allows people to access …
Enhanced model for PKI certificate validation in the mobile banking
MO Albasheer, EBM Bashier - 2013 International Conference …, 2013 - ieeexplore.ieee.org
Mobile banking is a service that allows customers to do banking transactions on their mobile
phone. Bank transactions, such as balance inquiry, money transfer, online payments and …
phone. Bank transactions, such as balance inquiry, money transfer, online payments and …
[HTML][HTML] Solving the challenges of pervasive computing
SM Shaheed, J Abbas, A Shabbir, F Khalid - Journal of Computer and …, 2015 - scirp.org
Modern research emphasizes Pervasive Computing change faces, learning cultures,
structures, communications, intellectual properties, information securities, data presentations …
structures, communications, intellectual properties, information securities, data presentations …