Derived certificate based on changing identity

MS Brown, DF Tapuska - US Patent 8,843,740, 2014 - Google Patents
(57) ABSTRACT A first device with a changing identity establishes a secure connection with
a second device in a network by acting as its own certificate authority. The first device issues …

Trust management for multimedia P2P applications in autonomic networking

F Almenárez, A Marín, D Díaz, A Cortés, C Campo… - Ad Hoc Networks, 2011 - Elsevier
In the last years, trust management has become a fundamental basis for facilitating the
cooperation between different users in peer-to-peer (P2P) multimedia applications within …

[PDF][PDF] 普适环境中基于身份的跨域认证方案

罗长远, 霍士伟, 邢洪智 - 通信学报, 2011 - infocomm-journal.com
利用椭圆曲线加法群提出了一种基于身份的签名算法, 算法中签名的验证结果相对于签名者身份
是一个常量, 该算法可保证跨域认证中用户身份的匿名性, 并且避免了复杂的双线性对运算 …

Trusted certificate authority to create certificates based on capabilities of processes

MS Brown, DF Tapuska - US Patent 9,026,789, 2015 - Google Patents
BACKGROUND A certificate authority may create for a server a certificate that binds an
identity of the server to a public key of the server using a digital signature of the certificate …

A virtual bridge certificate authority‐based cross‐domain authentication mechanism for distributed collaborative manufacturing systems

W Zhang, X Wang, MK Khan - Security and Communication …, 2015 - Wiley Online Library
The virtual enterprise (VE) is a new collaborative intelligent manufacturing paradigm that
pools the core competencies of its member enterprises through computer networks to exploit …

A novel authentication and authorization scheme in P2P networking using location-based privacy

BN Jagdale, JW Bakal - Evolutionary Intelligence, 2022 - Springer
In recent years, peer-to-peer (P2P) network has reached popularity in file sharing as it is a
distributed and decentralized network architecture. As there is no centralized authority, there …

基于证书的匿名跨域认证方案

丁永善, 李立新, 李作辉 - 网络与信息安全学报, 2018 - infocomm-journal.com
针对物联网中移动设备的跨域认证问题, 提出一种基于证书的匿名跨域认证方案. 首先, 结合PKI
和IBS 的相关特性, 提出一种基于证书的签名(CBS, certificate based signature) 方案 …

An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment

S Shin, T Shon, H Yeh, K Kim - Peer-to-Peer Networking and Applications, 2014 - Springer
With the advent of new generation of mobile access devices such as smartphone and tablet
PC, there is coming a need for ubiquitous collaboration which allows people to access …

Enhanced model for PKI certificate validation in the mobile banking

MO Albasheer, EBM Bashier - 2013 International Conference …, 2013 - ieeexplore.ieee.org
Mobile banking is a service that allows customers to do banking transactions on their mobile
phone. Bank transactions, such as balance inquiry, money transfer, online payments and …

[HTML][HTML] Solving the challenges of pervasive computing

SM Shaheed, J Abbas, A Shabbir, F Khalid - Journal of Computer and …, 2015 - scirp.org
Modern research emphasizes Pervasive Computing change faces, learning cultures,
structures, communications, intellectual properties, information securities, data presentations …