SPX: Global authentication using public key certificates

JJ Tardo, K Alagappan - Journal of Computer Security, 1992 - content.iospress.com
… If a user process spawns another process on another … , to properly authenticate identities
before issuing certificates. … The names in SPX certificates are thus X.500 hierarchical names…

Embedding x. 509 digital certificates in three-dimensional models for authentication, authorization, and traceability of product data

TD Hedberg Jr, S Krima… - … of computing and …, 2017 - asmedigitalcollection.asme.org
… with a certificate authority at the top of a certificate hierarchy. … The only requirement to using
our method for traceability is … We showed that digital signatures are a means of authenticating

[PDF][PDF] Authentication protocol using threshold certification in hierarchical-cluster-based ad hoc networks

KH Lee, SB Han, HS Suh, CS Hwang, S Lee - Journal of information …, 2007 - Citeseer
… After authenticating a CH using the CCH, there are nine steps in our end-to-end key exchange
procedure and authentication process for hierarchical clusters in large ad hoc networks, …

Generating correlated digital certificates: framework and applications

WT Zhu, J Lin - IEEE transactions on information forensics and …, 2016 - ieeexplore.ieee.org
… to authenticate herself to selected peers only, without having to reveal during the authentication
process … of members in a hierarchy (eg, a corporation) can be managed more efficiently. …

[HTML][HTML] Access control based on attribute certificates for medical intranet applications

I Mavridis, C Georgiadis, G Pangalos, M Khair - Journal of medical Internet …, 2001 - jmir.org
approach we propose the use of digital certificates, to be … A large number of techniques may
be used to authenticate a … node hierarchies (HNHs) are used as normal role hierarchies [11] …

LightLedger: a novel blockchain-based domain certificate authentication and validation scheme

A Garba, Z Chen, Z Guan… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… bandwidth to authenticate 26 certificates than other methods. … keys and digital certificates
[29]. Certificate-based 151 … the chain of trust in 161 the hierarchy of the PKI trust model. …

Document certificate authentication system using digitally signed QR code tag

HA Ahmed, JW Jang - Proceedings of the 12th International Conference …, 2018 - dl.acm.org
authentication process is also required to be done in a precise way. According to our survey,
most of HEI use a manual way of authenticating certificates … things simple in hierarchy level. …

[DOC][DOC] The Directory Authentication Framework

CD Recomendation - 1987 - stuff.mit.edu
… 1.5 The strong authentication method specified in this … an authenticating entity and a
certification authority; an … case the Certification Authorities do not relate in a hierarchical manner. …

Digital Certificate Management System for eHealth and mHealth Practitioners in Sri Lanka to Secure Medical Data

T Jinasena, RGN Meegama, RB Marasinghe - 2017 - dr.lib.sjp.ac.lk
… However, in this research we have used a novel and robust cryptography method called …
Method and system for authenticating digital certificates issued by an authentication hierarchy

Implementation of a hybrid certificate approach: enhancing efficiency and credibility in ICDL certification process

G Szyjewski - Procedia Computer Science, 2023 - Elsevier
certification bodies are exploring the use of digital certificates… relevant parties to authenticate
certificates and diplomas. … navigation and unclear information hierarchy, making it difficult …