Showing 1 - 20 results of 35 for search '"A certificate"', query time: 0.06s Refine Results
  1. 1

    Certificate-based cross-domain authentication scheme with anonymity by Yongshan DING, Lixin LI, Zuohui LI

    Published 2018-05-01
    “…Considered the cross-domain authentication of mobile devices in the Internet of things,a certificate based anonymous cross-domain authentication scheme was proposed.First,combined with the characteristics of PKI and IBS,a certificate based signature (CBS) algorithm was proposed,and the security of the proposed CBS scheme was proved.The verification result of the signature in the algorithm was constant,which ensured the anonymity of the authentication entities in the cross-domain process.The algorithm does not contain pairing,and avoids complex certificate management in traditional PKI and the key escrow and distribution of IBS.Then a cross-domain authentication scheme for mobile devices was constructed by combining the proposed signature algorithm.The scheme ensures the anonymity of authentication at the same time.Finally,compared with other schemes,the scheme proposed is more secure and has less computation cost and communication cost.Moreover,the scheme is simple and efficient,and could be applied to the cross-domain authentication of mobile devices.…”
    Get full text
    Article
  2. 2

    L’enseignement professionnel féminin à l’époque de la modernisation espagnole (1875-1930) by Maria Luisa Rico Gómez

    Published 2016-07-01
    “…In this context, the woman of the middle class becomes a student of the schools of arts and trades and the business schools because she was sure that a certificate diploma would modify the political and socio-economic relations imposed by the traditional speech of the woman.…”
    Get full text
    Article
  3. 3

    Research of platform identity attestation based on trusted chip by Qian-ying ZHANG, Deng-guo FENG, Shi-jun ZHAO

    Published 2014-08-01
    “…By studying the platform identity attestation base on trusted third parties, a scheme where a trusted computing platform is identified by a certificate and a token is proposed. In this scheme, only the token is used when the platform proves its identity. …”
    Get full text
    Article
  4. 4

    Application of public key infrastructure in telecom operators by Congli WANG, Jinhua WANG, Weijia XUE

    Published 2020-11-01
    “…With the implementation of cryptography law,the application of cryptography in information system in China has been promoted to the legal level,which requires the application of public key infrastructure in the mutual trust of network entities to be strengthened.A scheme of constructing unified telecom public key infrastructure with strict hierarchical structure was proposed,that is,establishing a national telecom root CA as a trust anchor,and each major telecom operator becomes an independent sub-ca,forming a certificate trust chain of “national telecom root CA- telecom operator sub-ca” and providing PKI security services.This scheme can not only realize the mutual recognition between telecom operators,but also help unify the telecom public key infrastructure to become a globally trusted electronic authentication service provider,so as to have more influence and say in the formulation of international certification standards.…”
    Get full text
    Article
  5. 5

    Certificate-based hybrid encryption scheme in the standard model by KANG Li, TANG Xiao-hu, FAN Jia

    Published 2009-01-01
    “…For construction a public cryptosystem that requiring fewer infrastructures than public key infrastructure(PKI),a certificate-based public-key encryption(CBE) scheme was proposed by Gentry.In CBE scheme,a certification was signed by a third part on an applicant’s public key or identity and sent to the applicant,the applicant saved it and used it as partial private key(decryption key).A receiver wanted to decrypt a ciphertext,the certification was needed from the third party and his own public-private keys,so CBE combined the best aspects of identity-based encryption(implicit cer-tification) and public key encryption(no escrow).A new efficient certificate-based hybrid encryption scheme with short public key was proposed,which based on Gentry’s identity-based encryption scheme,the new scheme can be proved re-sistance adaptive chosen ciphertext attack in the standard model(without random oracle).…”
    Get full text
    Article
  6. 6

    Deck the Halls: A Course to Build the Master Floral Designer Program Through the Pandemic and Beyond by James M. DelPrince, Patricia R. Knight

    Published 2024-12-01
    “…Results from the statewide workshop showed that 86% (n=32) of the students agreed to strongly agreed to participate in Extension floral design courses toward a certificate, with 14% (n=5) neutral. Three participants enrolled in the certificate program the following year. …”
    Get full text
    Article
  7. 7

    Secure vehicular digital forensics system based on blockchain by Meng LI, Chengxiang SI, Liehuang ZHU

    Published 2020-06-01
    “…The emergence of vehicular big data has brought a great promotion to better understand characteristics of vehicular networks,grasp needs of users and improve service qualities.However,malicious users and criminals leverage vehicular networks to conduct illegal behaviors,resulting in a decline in the service quality and difficulties in determining the liability in vehicle accidents.At the same time,there are still some security and privacy issues in the vehicular digital forensics,such as the identity privacy of the data provider and the request control of the data requester.Therefore,a secure vehicular digital forensics scheme based on blockchain was proposed.Firstly,a data requester registered with a certificate authority and an anonymous certificate was obtained for the subsequent data uploading.Then,the data user obtained the public-private key pair and user key in registration,which were respectively used for the data requesting and data decryption.Only if certain attributes were held,the right plaintext could be decrypted.Next,a consortium blockchain was jointly established by several institutions with high credibility to record all data transactions.Finally,the security and privacy were experimentally analyzed,and the performance was tested based on the Ethereum platform.…”
    Get full text
    Article
  8. 8

    Is There Uniformity in the Diagnosis of Learning Disability Globally? by Ashima Nehra, Ruchita Hazrati, Rhythm Makkar, Rajesh Hassija, Sanyam Bhardwaj, Apoorva Panshikar

    Published 2024-04-01
    “…Persons with LD lead a subsidized quality of life, especially in academic/vocational and psychosocial domains. A certificate issued by the medical boards at a state or district level is required to avail benefits such as scribes or relaxations. …”
    Get full text
    Article
  9. 9

    Factors Associated With Reflective Practice Among Specialist Nurses in China: A Latent Profile Analysis by Lichun Xu, Liyu Lin, Aixuan Guan, Qingqing Wang, Feng Lin, Weicong Lin, Jing Li

    Published 2024-12-01
    “…Methods A General Information Questionnaire and a Reflective Practice Questionnaire were distributed from July to August 2023 to specialist nurses who had obtained a Certificate of Nursing Practice, completed systematic specialist nurse training and were professionally qualified in six tertiary general hospitals in Xiamen, China. …”
    Get full text
    Article
  10. 10

    Pochodzenie rodu Branickich herbu Gryf. Pogląd historyka ustroju i prawa by Tomasz Kruszewski

    Published 2024-05-01
    “…Zielińska — outstanding scholar — cannot be treated as unquestionable, and it results from a simple ascertaining that this time it is not a certificate from a private magnate’s office, but a legal act application. …”
    Get full text
    Article
  11. 11

    IDENTIFICATION OF STRESS, ANXIETY, AND DEPRESSION LEVELS OF STUDENTS IN PREPARATION FOR THE EXIT EXAM COMPETENCY TEST by Sitti Rahmah Marsidi

    Published 2021-11-01
    “…The exit exam competency test is a requirement that must be met by students after completing all stages of education in order to get a certificate and Surat Tanda Registrasi (STR). The results of the preliminary study show that although there is a high chance of passing the exit exam competency test at the RMIK (Medical Records and Health Information) Study Program at Esa Unggul University (UEU), some of the students are not ready or not ready and feel negative in the form of anxiety, worry, fear. …”
    Get full text
    Article
  12. 12

    Legal Regulation of Inheritance of Non-Fungible Tokens by E. I. Leskina

    Published 2024-04-01
    “…Also, the valuation of the NFT will influence the amount of the state fee for issuing a certificate of inheritance. The practical implementation of NFT inheritance is facilitated by the development of appropriate digital technologies that optimize procedural aspects.…”
    Get full text
    Article
  13. 13

    The essence of the inheritance division agreement and its place in the system of civil law contracts by O. Ye. Kukhariev

    Published 2022-12-01
    “…The article reveals the essence of the contract for division of inheritance through a set of its defining features: 1) it is concluded after the expiry of the period for acceptance of the inheritance, but before the heirs receive a certificate of inheritance; 2) the parties are the heirs who have accepted the inheritance in the manner and within the time limits specified by civil law; 3) it has a much smaller, auxiliary value compared to the role of a civil law contract, as it generates legal consequences in conjunction with other legal facts; 4) in the presence of a nasciturus, the contract may be concluded only after the birth of a child; 5) the division of the inheritance is carried out taking into account the preemptive right of individual heirs to receive inheritance property in kind. …”
    Get full text
    Article
  14. 14

    Application get in hand - mobile-based geopark educational tourism Ciletuh-Sukabumi by Jatmika Bambang, Maulana Irpan, Al-Faqih Ridwan, Aulia Zouda Reyland

    Published 2024-01-01
    “…This application also provides a knowledge test about the Ciletuh-Palabuhanratu Geopark and if tourists successfully complete their edutourism assignments, they will be given an award in the form of a certificate issued by the Sukabumi Regency Tourism Office which can be exchanged for a free stay voucher at a hotel that has collaborated with the Regional Government. …”
    Get full text
    Article
  15. 15

    Analysis of the application of MSC ecolabelling in tuna product processing industry in Sibolga City by Winrison Fuah Ricky, Rahayu Rosi, Afranisa Zahra, Mardhatillah Inda, Muna Zakyatul, Andhini Nadia, Latiful Khobir Muhammad, Windarti

    Published 2025-01-01
    “…This makes the export destination country require a certificate issued by an institution. One of the standards used by such countries is the MSC ecolabel. …”
    Get full text
    Article
  16. 16

    Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain by Jawaid Iqbal, Arif Iqbal Umar, Noorul Amin, Abdul Waheed

    Published 2019-09-01
    “…To overcome these limitations, we have proposed an efficient and secure heterogeneous scheme for body sensor networks, in which biosensor nodes use a certificate-less cryptography environment to resolve the key escrow and certificate-management problems, while MS uses a public key infrastructure environment to enhance the scalability of the networks. …”
    Get full text
    Article
  17. 17

    Rancang Bangun Website Akademik dengan Penyimpanan Sertifikat Digital Menggunakan Teknologi Blockchain by Windra Swastika, Hermawan Wirasantosa, Oesman Hendra Kelana

    Published 2022-02-01
    “…Untuk pengujian skalabilitas didapatkan estimasi 10 juta blok membutuhkan kapasitas penyimpanan sebesar 22,6 GB untuk menjadi node atau miner pada jaringan blockchain ini.   Abstract A certificate is a form of appreciation that a person receives after completing a certain competency or learning test. …”
    Get full text
    Article
  18. 18

    Entrepreneurship Education and Perception Change: The Preliminary Outcomes of Compulsory Entrepreneurship Course Experience in Turkey by Hilmi Bahadır Akın, Yavuz Demirel

    Published 2015-08-01
    “…The senate of Aksaray University agreed on the compulsory entrepreneurship courses, which will be effective to all departments beginning from September 2012 -only selective for the departments which have curriculums determined centrally by the Ministry of Education or Higher Education Council of Turkey- and there is also an agreement between KOSGEB Republic of Turkey, Small and Medium Entreprises Development Organzation and Aksaray University to provide students a certificate which gives them the right to apply for certain financial incentives to start their own businesses. …”
    Get full text
    Article
  19. 19

    Determining the factors affecting cattle and small ruminant enterprises to get animal life insurance by Burak Mat, Mustafa Bahadır Çevrimli, Mustafa Agah Tekindal, Aytekin Günlü

    Published 2020-12-01
    “…<p> <b>Results: </b>In terms of professional experience; Having less than 5 years of professional experience, having a certificate of disease freeness in enterprises, and have additional income sources other than animal husbandry the insurances rate of the enterprises are increasing. …”
    Get full text
    Article
  20. 20

    Own Experience in the Use of Artificial Intelligence Technologies in the Diagnosis of Esophageal Achalasia by O. A. Storonova, N. I. Kanevskii, A. S. Trukhmanov, V. T. Ivashkin

    Published 2024-12-01
    “…The Federal Service for Intellectual Property (Rospatent) issued a certificate of state registration of the computer program No. 2024665795 dated July 5, 2024. …”
    Get full text
    Article