Cheung, T.-W., Chanson, S.T.: Design and Implementation of a PKI-based End-to-End Secure Infrastructure for Mobile E-Commerce. In: Proc. the IFIP TC6/WG6.1-21st Int'l Conf. on Formal Techniques for Networked and Distributed Systems Table of Contents, vol. 197, pp. 421-442 (2001)...
Design and Implementation of a PKI-Based Electronic Documents Protection Management System This paper presents the design and implementation of a new PKI-based electronic document protection system named EDPro (Electronic Document Protection mana... JB Liu,XQ Hu,Q Li,... - International Conference ...
A PKI system based on XKMS, which can provide XKMS-based PKI services, is introduced in this paper. This paper also describes the system design, developing environment in more details. The running instances, testing and analysis of this system are also given. By testing and analysis, it ind...
Based on java-jwt 4.4.0 with Kalkancrypt JCE-provider support (GG2004, GG2015) Note As part of our ongoing commitment to best security practices, we have rotated the signing keys used to sign previous releases of this SDK. As a result, new patch builds have been released using the new...
webservice interface call and distributed database based data exchang and it's key technologies.such as designing method of delamination and modularization,PKI technology,digital sign technology and data exchanging technology using web service and xml.Finally,a application example of secure model is ...
purposeprocessors.Reconfigurabkearchitecturecanbepostfabricationcustomizedforawideckassofappkicationtoachievesignificantkyhigherperformanceovergenerak-purposeprocessors.Firstkyintroducessystemarchi-tecturesofreconfigurabkesystem,thenpresentsanexampkeofembeddedreak-timecontrokappkicationthroughwhichamethodsfordesigningreconfig...
For this a Secure-Pre warning Collision Algorithm (S-PWCA) is implemented in firmware to make the IVAN message more secure. The implementation results show the Zigbee technology is best suit for the IVAN by taking advantage of Low power and coverage area.Keywords- IVC, IVAN, IVCN, PKI, S...
wolfSSL (Minimum version 5.2.0) [PKI, PSK, RPK(5.6.4+) and DTLS1.3(5.4.0+)] TinyDTLS [PSK and RPK] [DTLS Only] The examples directory contain a CoAP client, CoAP Resource Directory server and a CoAP server to demonstrate the use of this library. BUILDING Further information can be...
This is a portable implementation of Ed25519 based on the SUPERCOP "ref10" implementation. Additionally there is key exchanging and scalar addition included to further aid building a PKI using Ed25519. All code is licensed under the permissive zlib license. All code is pure ANSI C without any...
1. What is an email timestamp? Why do emails need a timestamping service? An email timestamping service is a cryptography timestamp signature attached to an email digital signature; it is not the electronic form of a traditional postmark. In the PKI application system, code sig...