Results 291 to 300 of about 322,522 (351)
Do we need prequalification of AI as a medical device to drive equitable adoption. [PDF]
Mateen BA, Aryeetey B, Darko DM.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Analysis of Counterfactual Quantum Certificate Authorization
International Journal of Theoretical Physics, 2016zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Wang, Tian-Yin +2 more
openaire +2 more sources
Security issues with certificate authorities
2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), 2017The current state of the internet relies heavily on SSL/TLS and the certificate authority model. This model has systematic problems, both in its design as well as its implementation. There are problems with certificate revocation, certificate authority governance, breaches, poor security practices, single points of failure and with root stores.
Jake A. Berkowsky, Thaier Hayajneh
openaire +1 more source
Empowered Certification Authority in VANETs
2009 International Conference on Advanced Information Networking and Applications Workshops, 2009The current research on privacy assurance in Vehicular Ad hoc Networks (VANETs) by pseudonym generation and network accountability through revocation has not achieved the desired results. Our research has identified the problems associated with the current techniques. We have revisited the pseudonym generation concept to address the privacy need of the
Akhlaq, Monis +4 more
openaire +2 more sources
Evaluating certification authority security
1998 IEEE Aerospace Conference Proceedings (Cat. No.98TH8339), 2002A growing number of applications in the Internet are making use of X.509 public key certificates. Examples include security protocols such as SSL (used in web browsers), IPsec (used in firewalls and desktop computers), S/MIME (a secure e-mail protocol), and SET (the electronic commerce credit card transaction protocol).
openaire +1 more source
Certificate based authorization simulation system
25th Annual International Computer Software and Applications Conference. COMPSAC 2001, 2002Using certificates for distributed authorizations in computer network systems has been discussed in the literature. However real implementations of the concept are rarely seen. In our certificate based authorization simulation system (CBASS) project, we prototyped a computer system including some of the emulated functions of an operating system such as
J. Dai, J. Alves-Foss
openaire +1 more source
DNS Certification Authority Authorization (CAA) Resource Record
2019The Certification Authority Authorization (CAA) DNS Resource Record allows a DNS domain name holder to specify one or more Certification Authorities (CAs) authorized to issue certificates for that domain. CAA Resource Records allow a public Certification Authority to implement additional controls to reduce the risk of unintended certificate mis-issue ...
P. Hallam-Baker +2 more
openaire +1 more source

