Abstract: The increasing number of clients and users of e-banking, e-government and e-application through digital communications, made it a must to develop new methods and solutions for authentications and secure access. Digital certificates are one of these methods for secure transactions, X.509 certificate is one standard for these digital certificates, Despite the fact that x.509 certificate is of high level of security and authenticity, it has many weaknesses as not applying dynamic delegation to it.. The efficiency of proxy certificate which proposed as a practical solution in the field of dynamic delegation could not find solutions for its weaknesses Which were the main motivation to work on this research trying to come up with new so...
In this paper a design and an implementation of a configurable system for managing the X509 certific...
International audienceA Public Key Infrastructure (PKI) is considered one of the most important tech...
Digital evidence, such as digital signatures, is of crucial im-portance in the emerging digitally op...
Abstract: E-commerce means buying and selling goods and services across the Internet. Secured commun...
Proxy credentials are commonly used in security systems when one entity wishes to grant to another e...
Digital certificates are one of the key components to ensure secure network communications. The comp...
This work deals with the possibilities of using digital certificates and certification authorities o...
International audienceMost of industrial or public domains involve a trusted and distributed infrast...
Delegation is frequently used in real world. In order to make it possible in on-line, the fact of de...
Authentication in various communication systems and protocols is often based on X.509 identity certi...
Abstract:Today almost all organizations in the world are network-centric paradigm and to safeguard t...
The implementation of electronic governance related projects implies user authentication,accounts ac...
A basic function of all signatures, digital or not, is to express trust and authority, explicit or ...
This poster outlines the findings of the Digital Certificate Operation in a Complex Environment (DCO...
Public-key infrastructures are increasingly being used as foundation for several security solutions,...
In this paper a design and an implementation of a configurable system for managing the X509 certific...
International audienceA Public Key Infrastructure (PKI) is considered one of the most important tech...
Digital evidence, such as digital signatures, is of crucial im-portance in the emerging digitally op...
Abstract: E-commerce means buying and selling goods and services across the Internet. Secured commun...
Proxy credentials are commonly used in security systems when one entity wishes to grant to another e...
Digital certificates are one of the key components to ensure secure network communications. The comp...
This work deals with the possibilities of using digital certificates and certification authorities o...
International audienceMost of industrial or public domains involve a trusted and distributed infrast...
Delegation is frequently used in real world. In order to make it possible in on-line, the fact of de...
Authentication in various communication systems and protocols is often based on X.509 identity certi...
Abstract:Today almost all organizations in the world are network-centric paradigm and to safeguard t...
The implementation of electronic governance related projects implies user authentication,accounts ac...
A basic function of all signatures, digital or not, is to express trust and authority, explicit or ...
This poster outlines the findings of the Digital Certificate Operation in a Complex Environment (DCO...
Public-key infrastructures are increasingly being used as foundation for several security solutions,...
In this paper a design and an implementation of a configurable system for managing the X509 certific...
International audienceA Public Key Infrastructure (PKI) is considered one of the most important tech...
Digital evidence, such as digital signatures, is of crucial im-portance in the emerging digitally op...