Loading…
Double-authentication-preventing signatures
Poettering, Bertram, Stebila, Douglas
Published in International journal of information security (01.02.2017)
Published in International journal of information security (01.02.2017)
Get full text
Journal Article
Loading…
Conceptual Modeling of a Procurement Process
Al, Sabah, Al-Otaibi, Mona
Published in International journal of advanced computer science & applications (2018)
Published in International journal of advanced computer science & applications (2018)
Get full text
Journal Article
Loading…
Loading…
Loading…
Generating Correlated Digital Certificates: Framework and Applications
Zhu, Wen-Tao, Lin, Jingqiang
Published in IEEE transactions on information forensics and security (01.06.2016)
Published in IEEE transactions on information forensics and security (01.06.2016)
Get full text
Journal Article
Loading…
Loading…
Progressing Toward Airliners' Reduced-Crew Operations: A Systematic Literature Review
Schmid, Daniela, Stanton, Neville A.
Published in International journal of aerospace psychology (02.04.2020)
Published in International journal of aerospace psychology (02.04.2020)
Get full text
Journal Article
Loading…
Loading…
Sensing service architecture for smart cities using social network platforms
Chifor, Bogdan-Cosmin, Bica, Ion, Patriciu, Victor-Valeriu
Published in Soft computing (Berlin, Germany) (01.08.2017)
Published in Soft computing (Berlin, Germany) (01.08.2017)
Get full text
Journal Article
Loading…
An efficient anonymous remote attestation scheme for trusted computing based on improved CPK
Fajiang, Yu, Jing, Chen, Yang, Xiang, Jiacheng, Zhu, Yangdi, Zhao
Published in Electronic commerce research (01.09.2019)
Published in Electronic commerce research (01.09.2019)
Get full text
Journal Article
Loading…
The framework of user information protection via secure SSO and PKI
Oh Kim, Jeong, Woo Park, Min, Seung Jo, Woo, Seok Choi, Ki
Published in International journal of engineering & technology (Dubai) (08.06.2018)
Published in International journal of engineering & technology (Dubai) (08.06.2018)
Get full text
Journal Article
Loading…
Loading…
VisTAS: blockchain-based visible and trusted remote authentication system
Ali, Ahmad, Ahmed, Mansoor, Khan, Abid, Anjum, Adeel, Ilyas, Muhammad, Helfert, Markus
Published in PeerJ. Computer science (12.05.2021)
Published in PeerJ. Computer science (12.05.2021)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Loading…
METHOD AND DEVICE FOR CONFIRMING AUTHENTICITY OF A PUBLIC KEY INFRASTRUCTURE (PKI) TRANSACTION EVENT
THOMAS, Shanthi, E, METKE, Anthony, R, IGNACI, Ananth, HIMAWAN, Erwin
Year of Publication 08.07.2020
Get full text
Year of Publication 08.07.2020
Patent
Loading…