Incorporating revocation of certification into a PKI model
Public key infrastructures (PKIs) are complex distributed systems that are responsible for giving users enough information to make reasonable trust judgments about one another. PKI is a prerequisite for security in distributed systems and for electronic commerce. The validation of public keys is hen...
| Main Authors: | Azimzadeh, Fatemeh, Khatun, Sabira, Mohd Ali, Borhanuddin, Kargar, Mohammad J. |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2007
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/48059/ http://psasir.upm.edu.my/id/eprint/48059/1/Incorporating%20revocation%20of%20certification%20into%20a%20PKI%20model.pdf |
Similar Items
Incorporation Of Certification Revocation And Time Concept Into A Trust Model For Information Security System
by: Azimzadeh, Fatemeh
Published: (2007)
by: Azimzadeh, Fatemeh
Published: (2007)
SECRET: a secure and efficient certificate revocation scheme for mobile ad hoc networks
by: Mall, Dieynaba, et al.
Published: (2014)
by: Mall, Dieynaba, et al.
Published: (2014)
A light-PKI Fast Authentication Model
by: Li, D., et al.
Published: (2011)
by: Li, D., et al.
Published: (2011)
MALAM ANEKARAGAM KEMUNCAK AKTIVITI PKI
by: MPRC, Pusat Media & Perhubungan Awam
Published: (2015)
by: MPRC, Pusat Media & Perhubungan Awam
Published: (2015)
Binarized revocable biometrics in face recognition
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
Incorporating information quality criteria in blog search engine
by: Azimzadeh, Fatemeh, et al.
Published: (2011)
by: Azimzadeh, Fatemeh, et al.
Published: (2011)
MALAM ANEKARAGAM PKI 2016 - BERHIBUR SAMBIL
BERAMAL
by: MPRC, Pusat Media & Perhubungan Awam
Published: (2016)
by: MPRC, Pusat Media & Perhubungan Awam
Published: (2016)
On the key revocation schemes in wireless sensor networks
by: Mall, Dieynaba, et al.
Published: (2013)
by: Mall, Dieynaba, et al.
Published: (2013)
Expression of p16 and pKi-67 in cervical preneoplasia and neoplasia
by: Looi, Mee-Lee, et al.
Published: (2011)
by: Looi, Mee-Lee, et al.
Published: (2011)
Replication, evocation and revocation of linguistic sexism
in translated national anthems
by: Samson Olasunkanmi Oluga,, et al.
Published: (2016)
by: Samson Olasunkanmi Oluga,, et al.
Published: (2016)
Revocable and non-invertible multibiometric template protection based on matrix transformation
by: Jegede, Abayomi, et al.
Published: (2018)
by: Jegede, Abayomi, et al.
Published: (2018)
Exploring strategies post- revocation of licensing exemption for Malaysia’s tailing processing industry
by: Muhammad Abdullah Rahmat,, et al.
Published: (2023)
by: Muhammad Abdullah Rahmat,, et al.
Published: (2023)
Secure file sharing with public key infrastructure (PKI) enablement / Noor Azlina Ismail @ Hassan
by: Ismail @ Hassan, Noor Azlina
Published: (2015)
by: Ismail @ Hassan, Noor Azlina
Published: (2015)
Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue
by: Mall, Dieynaba, et al.
Published: (2015)
by: Mall, Dieynaba, et al.
Published: (2015)
Document ranking using information quality criteria in weblog search engine
by: Azimzadeh, Fatemeh
Published: (2013)
by: Azimzadeh, Fatemeh
Published: (2013)
A secure and efficient revocation protocol for group signatures in vehicular ad hoc networks / Nur Fadhilah Mohd Shari
by: Nur Fadhilah , Mohd Shari
Published: (2018)
by: Nur Fadhilah , Mohd Shari
Published: (2018)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
Weblog search engine based on quality criteria
by: Azimzadeh, Fatemeh, et al.
Published: (2011)
by: Azimzadeh, Fatemeh, et al.
Published: (2011)
Wireless Spread Spectrum Communication Channel Modelling
and Simulation Technical Area: Wireless Communication
by: Khatun, Sabira, et al.
Published: (2002)
by: Khatun, Sabira, et al.
Published: (2002)
Distinctive key management method to secure multicast IPv6 networks
by: Mehdizadeh, Abbas, et al.
Published: (2009)
by: Mehdizadeh, Abbas, et al.
Published: (2009)
Qos-Aware Handover Scheme Using Context Transfer With Link Layer Trigger For Hierarchical Mobile IP
by: Pillay, Shamini, et al.
Published: (2004)
by: Pillay, Shamini, et al.
Published: (2004)
A noble channel controller for combined CDMA and SDMA systems
by: Khatun, Sabira, et al.
Published: (2009)
by: Khatun, Sabira, et al.
Published: (2009)
An integrated controller for car-accessories and home/ office multimedia devices using mobile phone with security features.
by: Khatun, Sabira, et al.
Published: (2009)
by: Khatun, Sabira, et al.
Published: (2009)
Inter-domain handover in WiMAX networks using optimized fast mobile IPv6.
by: Seyyedoshohadaei, Seyyed Masoud, et al.
Published: (2012)
by: Seyyedoshohadaei, Seyyed Masoud, et al.
Published: (2012)
Certification process for certification of quality management system
by: Zainudin, Dolhadi
Published: (2009)
by: Zainudin, Dolhadi
Published: (2009)
Using IP networks as a deviceless storage for future portable computers
by: Farizani, Seyed Reza Kamel Tabbakh, et al.
Published: (2010)
by: Farizani, Seyed Reza Kamel Tabbakh, et al.
Published: (2010)
A new dynamic code assignment algorithm for joint CDMA and SDMA system
by: Odeh, Nidhal A. S., et al.
Published: (2008)
by: Odeh, Nidhal A. S., et al.
Published: (2008)
A joint PHY/MAC cross-layer design for UWB under power control
by: Saeed, Rashid Abdelhaleem, et al.
Published: (2010)
by: Saeed, Rashid Abdelhaleem, et al.
Published: (2010)
An approach to improve the state scalability of source specific multicast
by: Al-Talib, Sahar A., et al.
Published: (2009)
by: Al-Talib, Sahar A., et al.
Published: (2009)
Performance enhancement of UWB power control using ranging and narrowband interference mitigation technique
by: Saeed, Rashid, et al.
Published: (2009)
by: Saeed, Rashid, et al.
Published: (2009)
Reduced-rank technique for joint channel estimation in TD-SCDMA systems.
by: Ismail, Alyani, et al.
Published: (2013)
by: Ismail, Alyani, et al.
Published: (2013)
Multicast, Hierarchical and Fast Handover in Mobile Ipv6 Wireless Network: A Test-Bed Experience
by: Yong, Chu Eu, et al.
Published: (2008)
by: Yong, Chu Eu, et al.
Published: (2008)
Radiofrequency waves increase the brain levels of inflammatory biomarkers, neurotrophin and serotonin
by: Azimzadeh, Mansour, et al.
Published: (2024)
by: Azimzadeh, Mansour, et al.
Published: (2024)
Drivers for adopting Malaysian timber certification scheme/programme for the endorsement of forest certification chain of custody certification in Malaysia
by: Murughan, M., et al.
Published: (2024)
by: Murughan, M., et al.
Published: (2024)
Performance enhancement of UWB power control using ranging and narrowband interference mitigation technique
by: Saeed, Rashid Abdelhaleem, et al.
Published: (2009)
by: Saeed, Rashid Abdelhaleem, et al.
Published: (2009)
Performance evaluation of multi-user detection in Cdma using micro-genetic algorithm
by: Ahmad, Azmi, et al.
Published: (2005)
by: Ahmad, Azmi, et al.
Published: (2005)
A lower complexity K best algorithm for multiple input and multiple output detection
by: Jabir, Amjad Najim, et al.
Published: (2011)
by: Jabir, Amjad Najim, et al.
Published: (2011)
Performance analysis of ultra-wideband system in presence of IEEE802.11a and UMTS/WCDMA frequency bands
by: Saeed, Rashid Abdelhaleem, et al.
Published: (2007)
by: Saeed, Rashid Abdelhaleem, et al.
Published: (2007)
IPD-OUM Certificate Presentation Ceremony
by: Anuwar Ali,
Published: (2003)
by: Anuwar Ali,
Published: (2003)
IPD-OUM Certificate Presentation Ceremony
by: Anuwar Ali,
Published: (2004)
by: Anuwar Ali,
Published: (2004)
Similar Items
-
Incorporation Of Certification Revocation And Time Concept Into A Trust Model For Information Security System
by: Azimzadeh, Fatemeh
Published: (2007) -
SECRET: a secure and efficient certificate revocation scheme for mobile ad hoc networks
by: Mall, Dieynaba, et al.
Published: (2014) -
A light-PKI Fast Authentication Model
by: Li, D., et al.
Published: (2011) -
MALAM ANEKARAGAM KEMUNCAK AKTIVITI PKI
by: MPRC, Pusat Media & Perhubungan Awam
Published: (2015) -
Binarized revocable biometrics in face recognition
by: Pang, Ying Han, et al.
Published: (2005)