Sciweavers

250 search results - page 3 / 50
» Modeling Public Key Infrastructures in the Real World
Sort
View
SP
2000
IEEE
13 years 10 months ago
An Efficient, Dynamic and Trust Preserving Public Key Infrastructure
Nested certification is a methodology for efficient certificate path verification. Nested certificates can be used together with classical certificates in the Public Key Infrastru...
Albert Levi, M. Ufuk Çaglayan
MEDES
2010
ACM
13 years 1 months ago
UBI-hotspots: sustainable ecosystem infrastructure for real world urban computing research and business
We report a novel deployment of so-called UBI-hotspots in a city center to establish an ecosystem infrastructure for conducting diverse urban computing research and business in au...
Timo Ojala, V. Valkama, Hannu Kukka, Tommi Heikkin...
SIGUCCS
1999
ACM
13 years 10 months ago
Who's Got the Key?
This paper attempts to illuminate several fundamental concepts used in the creation of a Public Key Infrastructure (PKI). These concepts include encryption, public key cryptograph...
David Henry
CIS
2007
Springer
14 years 14 days ago
A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-Key Cryptography
The session initiation protocol (SIP) is considered as the dominant signaling protocol for calls over the internet. However, SIP authentication typically uses HTTP digest authentic...
Fengjiao Wang, Yuqing Zhang
SP
2002
IEEE
122views Security Privacy» more  SP 2002»
13 years 6 months ago
The UNICORE Grid infrastructure
UNICORE (Uniform Interface to Computer Resources) is a software infrastructure supporting seamless and secure access to distributed resources. UNICORE allows uniform access to dif...
Mathilde Romberg