Verifying the authenticity of digital certificates
| Main Author: | Kamel Ariffin, Muhammad Rezal |
|---|---|
| Format: | Newspaper |
| Language: | English |
| Published: |
2021
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/90689/ http://psasir.upm.edu.my/id/eprint/90689/1/Verifying%20the%20authenticity%20of%20digital%20certificates.jpg |
Similar Items
UPM perkenal aplikasi certificate verifier
by: Utusan Malaysia
Published: (2017)
by: Utusan Malaysia
Published: (2017)
The necessity of laboratory analyses to verify the authenticity of halal products
by: Mustafa, Shuhaimi
Published: (2014)
by: Mustafa, Shuhaimi
Published: (2014)
Rapid DNA-based analytical techniques to verify the authenticity of Halal food
by: Mustafa, Shuhaimi, et al.
Published: (2022)
by: Mustafa, Shuhaimi, et al.
Published: (2022)
Digital verification and authentication system for test certificates (DVASTC-COVID-19)
by: Rassem, Taha H., et al.
Published: (2021)
by: Rassem, Taha H., et al.
Published: (2021)
Certificate authentication system using QR code
by: Chan, Ming Ting
Published: (2014)
by: Chan, Ming Ting
Published: (2014)
Noise induced synchronization of time-delayed semiconductor lasers and authentication based asymmetric encryption.
by: Banerjee, Santo, et al.
Published: (2013)
by: Banerjee, Santo, et al.
Published: (2013)
Verifying requirements for resource-bounded agents
by: Abdur, Rakib
Published: (2011)
by: Abdur, Rakib
Published: (2011)
Verifying heterogeneous multi-agent programs
by: Doan, Thu Trang, et al.
Published: (2014)
by: Doan, Thu Trang, et al.
Published: (2014)
Verifying systems of resource-bounded agents
by: Alechina, Natasha, et al.
Published: (2016)
by: Alechina, Natasha, et al.
Published: (2016)
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abdul Rahman, Normahirah, et al.
Published: (2016)
by: Nek Abdul Rahman, Normahirah, et al.
Published: (2016)
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abd Rahman, Normahirah, et al.
Published: (2014)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2014)
To verify or not to verify: using partial least squares to predict effect of online news on panic buying during pandemic
by: Tan, Kim Lim, et al.
Published: (2022)
by: Tan, Kim Lim, et al.
Published: (2022)
Efficiency three ways: tested, verified, and formalised
by: Handley, Martin AT
Published: (2020)
by: Handley, Martin AT
Published: (2020)
Essays on strategic naivety and disclosure of verifiable information
by: Sheth, Jesal Dilip
Published: (2019)
by: Sheth, Jesal Dilip
Published: (2019)
Compiling concurrency correctly: verifying software transactional memory
by: Hu, Liyang
Published: (2013)
by: Hu, Liyang
Published: (2013)
Verifying existence of resource-bounded coalition uniform strategies
by: Alechina, Natasha, et al.
Published: (2016)
by: Alechina, Natasha, et al.
Published: (2016)
A secure, anonymous and verifiable E-Voting system
by: Ooi, Elynn
Published: (2020)
by: Ooi, Elynn
Published: (2020)
URASP: an ultralightweight RFID authentication scheme using permutation operation
by: Mohd Shariq, et al.
Published: (2021)
by: Mohd Shariq, et al.
Published: (2021)
Towards a formally verified functional quantum programming language
by: Green, Alexander S.
Published: (2010)
by: Green, Alexander S.
Published: (2010)
A framework for relating, implementing and verifying argumentation models and their translations
by: van Gijzel, Bas
Published: (2016)
by: van Gijzel, Bas
Published: (2016)
In situ target strength estimates of visually verified orange roughy
by: Macaulay, G., et al.
Published: (2013)
by: Macaulay, G., et al.
Published: (2013)
Digital watermarking for mammogram authentication
by: Abdul Manaf, Azizah, et al.
Published: (2010)
by: Abdul Manaf, Azizah, et al.
Published: (2010)
Challenging Authentic Digital Scenarios
by: Ifenthaler, Dirk
Published: (2016)
by: Ifenthaler, Dirk
Published: (2016)
A model for characterizing knowledge utilization in verifying successful knowledge transfer
by: Abdullah, Salfarina, et al.
Published: (2018)
by: Abdullah, Salfarina, et al.
Published: (2018)
The virtual source method - verifying the concept using numerical and physical modelling
by: Saul, Matthew, et al.
Published: (2007)
by: Saul, Matthew, et al.
Published: (2007)
A digital signature system.
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2010)
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2010)
Digitally signed electronic certificate for workshop / Azinuddin Baharum
by: Baharum, Azinuddin
Published: (2017)
by: Baharum, Azinuddin
Published: (2017)
Verifying the correctness of UML statechart outpatient clinic based on common modeling language and SMV
by: Abdul Samat, Pathiah, et al.
Published: (2021)
by: Abdul Samat, Pathiah, et al.
Published: (2021)
Digital watermarking for medical image authentication
by: Noor Aqilah, Abdul Halim
Published: (2019)
by: Noor Aqilah, Abdul Halim
Published: (2019)
Analysing performance in authentic digital scenarios
by: Gibson, David, et al.
Published: (2016)
by: Gibson, David, et al.
Published: (2016)
Modelling and verifying dynamic access control policies in workflow-based healthcare systems
by: Faruqui, Rokan Uddin
Published: (2020)
by: Faruqui, Rokan Uddin
Published: (2020)
Inhibitors of leishmania mexicana phosphoglycerate mutase identified by virtual screening and verified by inhibition studies
by: Ahmad Fuad, Fazia Adyani, et al.
Published: (2016)
by: Ahmad Fuad, Fazia Adyani, et al.
Published: (2016)
Inhibitors of Leishmania mexicana phosphoglycerate mutase identified by virtual screening and verified by inhibition studies
by: Fazia Adyani Ahmad Fuad,, et al.
Published: (2016)
by: Fazia Adyani Ahmad Fuad,, et al.
Published: (2016)
Religion and legal spaces: in Gods we Trust; in the Church we Trust, but need to verify
by: McGoldrick, Dominic
Published: (2012)
by: McGoldrick, Dominic
Published: (2012)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
The Mellin Transform of Generalized Functions and Some Applications
by: Kamel Ariffin, Muhammad Rezal
Published: (2002)
by: Kamel Ariffin, Muhammad Rezal
Published: (2002)
Chaos Based Cryptography An Alternative to Algebraic Cryptography
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
The diophantine equation hard problem (DEHP) as an asymmetric primitive - is it possible?
by: Kamel Ariffin, Muhammad Rezal
Published: (2013)
by: Kamel Ariffin, Muhammad Rezal
Published: (2013)
Moratorium boroskan kita
by: Ariffin, Muhammad Rezal Kamel
Published: (2020)
by: Ariffin, Muhammad Rezal Kamel
Published: (2020)
Constructing the prime orbit theorem for the beta transformation
by: Kamel Ariffin, Muhammad Rezal
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal
Published: (2009)
Similar Items
-
UPM perkenal aplikasi certificate verifier
by: Utusan Malaysia
Published: (2017) -
The necessity of laboratory analyses to verify the authenticity of halal products
by: Mustafa, Shuhaimi
Published: (2014) -
Rapid DNA-based analytical techniques to verify the authenticity of Halal food
by: Mustafa, Shuhaimi, et al.
Published: (2022) -
Digital verification and authentication system for test certificates (DVASTC-COVID-19)
by: Rassem, Taha H., et al.
Published: (2021) -
Certificate authentication system using QR code
by: Chan, Ming Ting
Published: (2014)