Skip to main content
    • by  and +1
    •   12  
      Public Key InfrastructureAccess ControlMobile Ad Hoc NetworkAd hoc network
    • by 
    •   10  
      Mobile Ad Hoc NetworkAd Hoc NetworksThAd hoc network
    • by 
    •   5  
      Security in routing protocolsSecurity ManagementSecurity ProtocolCertificate Authority
The Italian Legislation on Digital Signatures and the Role of Italian Banks as Certificate Authorities: A Strategic Analysis......................... ....................................................................................... more
    • by 
    •   6  
      Digital SignatureLegislationBanking SectorCertificate Authority
Presently, mobile handheld device has successfully replaced traditional telephone to become the most popular wireless communication tools. Mobile Short Message Service (SMS) and Multimedia Message Service (MMS) fulfill almost all the user... more
    • by 
    •   7  
      Public Key InfrastructureHandheld Device UseSecure CommunicationUser Requirements
    • by  and +1
    •   77  
      MarketingPublic AdministrationPrivacyManufacturing
    • by 
    •   6  
      Human FactorsTechnology ManagementAir traffic controlAvionics
    • by 
    •   13  
      Distributed ComputingMobile Ad Hoc NetworkIntrusion DetectionKey Management
    • by 
    •   20  
      AlgorithmsBiometricsComputingCoding
Presently, mobile handheld device has successfully replaced traditional telephone to become the most popular wireless communication tools. Mobile Short Message Service (SMS) and Multimedia Message Service (MMS) fulfill almost all the user... more
    • by 
    •   12  
      Computer SciencePublic Key InfrastructureCryptographyHandheld Device Use
    • by 
    •   11  
      Digital SignaturePublic Key InfrastructureNetwork ProtocolsAd Hoc Networks
Many safety-related, certification standards exist for developing safety-critical systems. System safety assessments are common practice and system certification according to a standard requires submitting relevant software safety... more
    • by 
    •   12  
      Software EngineeringSafetyModeling LanguageUML
Digital certificates signed by trusted certification authorities (CAs) are used for multiple purposes, most commonly for secure binding of public keys to names and other attributes of their owners. Although a certificate usually includes... more
    • by 
    •   8  
      Information SecurityInformationData StructureOnion
    • by 
    •   12  
      Public Key InfrastructureVehicle DynamicsPerformance AnalysisPerformance Evaluation
In India, the Information Technology Act, received the Presidential Assent in June 2000. The Act is based on the Model Law on E-Commerce adopted by the United Nations Commission on International Trade Law (UNCITRAL). The essence of the... more
    • by 
    •   13  
      Computer ScienceInformation TechnologyLawCybercrimes
    • by 
    •   20  
      AlgorithmsBiometricsComputingCoding
The most emerging technology for people identification and authentication is biometrics. In contrast with traditional recognition approaches, biometric authentication relies on who a person is or what a person does, being based on... more
    • by 
    •   13  
      BiometricsCryptographyDatabasesKey Management
Portions of this document have been abstracted from other U.S. Government publications, including: “Minimum InteroperabilitySpecification for PKI Components (MISPC), Version 1” NIST SP 800-15, January 1998;“Certification Authority... more
    • by  and +1
    •   4  
      Public Key InfrastructureBest practiceFederal GovernmentCertificate Authority
    • by 
    •   20  
      ModelingConfidenceDistributed SystemRouting protocols
    • by 
    •   7  
      Digital SignatureLarge ScaleSecurity ProtocolCertificate Authority
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
    • by 
    •   8  
      Information SecuritySecurityAccess ControlComputer Security
Today, one of the biggest concerns about using the Internet for business-critical data is security. This paper will concentrate on the area of software security based on public key cryptographic technology. The Public Key systems make it... more
    • by 
    •   7  
      Software SecurityPublic Key InfrastructureOrganizational structureSecurity Policy
    • by 
    •   13  
      Distributed ComputingMobile Ad Hoc NetworkIntrusion DetectionKey Management
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) authentication scheme for self- securing mobile ad hoc networks (MANETs) suffering from high packet-loss and node mobility. In order to... more
    • by 
    •   6  
      Network ManagementPerformance EvaluationMobile Ad Hoc NetworkPacket Loss
    • by 
    •   3  
      Ad hoc networkThreshold CryptographyCertificate Authority
    • by 
    •   13  
      LocalizationMobile ComputingSafetyMobile Ad Hoc Network
    • by  and +1
    •   5  
      Air traffic controlDesign processDesign RationaleDevelopment Process
    • by 
    •   9  
      Monte Carlo SimulationComputer SimulationProbabilistic Model CheckingLife Cycle
    • by 
    •   5  
      Grid ComputingDelegationVirtual OrganizationAuthorization
    • by 
    •   6  
      Information SecurityEconomic TheoryPublic Key InfrastructureInformation Economics
Many safety-critical embedded systems are subject to certification requirements; some systems may be required to meet multiple sets of certification requirements, from different certification authorities. Certification requirements in... more
    • by 
    •   13  
      Distributed ComputingComputer HardwareComputer SoftwareComputer Model
This paper presents and discusses a web oriented, interactive anonymous buyer-seller watermarking protocol. In particular, the protocol enables buyers who are neither provided with digital certificates issued by trusted certification... more
    • by 
    •   9  
      Image ProcessingAnonymityDigital WatermarkingSafety
    • by 
    •   7  
      Mobile Ad Hoc NetworkWireless NetworkSecret SharingMobile Network
    • by 
    •   10  
      Distributed SystemMobile Ad Hoc NetworkKey ManagementPublic key cryptography
    • by 
    •   24  
      CardiologyDistributed Denial of Service AttackComputer SecurityReverse Engineering
    • by 
    •   8  
      Network SecurityOpen SourceWireless NetworkCommunity Networks
    • by  and +1
    •   8  
      Digital SignaturePublic Key InfrastructureProvable SecurityPublic key cryptography
Market research surveys report that 75% of hacks occur at the application layer. Of the multiple vulnerabilities that exist in Web application software, proper authentication of the client and the server to each other is fundamental to... more
    • by 
    •   12  
      Computer ScienceInformation SecurityMarket ResearchWeed Management
The development of e-commerce requires security to win the confidence of its stakeholders. Among the common protocols to establish safe financial transactions, Secure Electronic Transaction (SET) protocol has more security providing a... more
    • by 
    •   5  
      Public Key InfrastructureElectronic transactionsCertificate AuthorityPayment Gateway
    • by 
    •   2  
      Information SystemsCertificate Authority
    • by 
    •   5  
      Distributed ComputingPublic Key InfrastructureComputer CommunicationsCertificate Authority
MANET applications and services pose many interesting challenges due to their unique features. Specifically, security is getting a lot of attention in every aspect of MANETs due to their inherent vulnerability to attacks. Threats exist in... more
    • by 
    •   13  
      Computer ScienceMobile Ad Hoc NetworksNetwork SecurityPublic Key Infrastructure
    • by 
    •   8  
      DoS AttackProvable SecurityStandard ModelPublic key cryptography
    • by 
    •   20  
      AlgorithmsBiometricsComputingCoding
    • by 
    •   20  
      Digital SignatureBiometricsCryptographyAuthentication
    • by 
    •   5  
      Security ManagementClock synchronizationBoolean SatisfiabilityCertificate Authority
    • by 
    •   5  
      SecurityCluster ComputingCertificate AuthorityService Orientation
Cryptography and certification are considered necessary Internet features and must be used together, for example in ecommerce.This work deals with certification issues and reviews the three most common methods in use today, whichare based... more
    • by 
    • Certificate Authority
    • by 
    •   7  
      Public Key InfrastructureHandheld Device UseSecure CommunicationUser Requirements
    • by 
    •   7  
      Public Key InfrastructureHandheld Device UseSecure CommunicationUser Requirements