Movatterモバイル変換


[0]ホーム

URL:


Young et al., 1996 - Google Patents

Technologies to Support Authentication in Higher Education: A Study for the UK Joint Information Systems Committee, August 21th, 1996

Young et al., 1996

ViewPDF
Document ID
11842501425002583552
Author
Young A
Kirstein P
Ibbetson A
Publication year

External Links

Snippet

This report provides a short and limited study, commissioned by JISC, of the technologies available to support authentication, reviews the needs expressed by a set of people contacted for the study, and provides the beginnings of a road-map on how a National …
Continue reading atresearchportal.bath.ac.uk (PDF) (other versions)

Similar Documents

PublicationPublication DateTitle
US20200304315A1 (en)System and method for blockchain-based cross-entity authentication
US9455978B2 (en)System and method to enable PKI- and PMI- based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
US6539093B1 (en)Key ring organizer for an electronic business using public key infrastructure
US6957199B1 (en)Method, system and service for conducting authenticated business transactions
Kuhn et al.Introduction to public key technology and the federal PKI infrastructure
GarfinkelEmail-based identification and authentication: An alternative to PKI?
US6363365B1 (en)Mechanism for secure tendering in an open electronic network
US7184988B1 (en)Methods for operating infrastructure and applications for cryptographically-supported services
McCorry et al.Refund attacks on Bitcoin’s payment protocol
US20030163686A1 (en)System and method for ad hoc management of credentials, trust relationships and trust history in computing environments
US20020162003A1 (en)System and method for providing trusted browser verification
CN110189184A (en)A kind of electronic invoice storage method and device
Onieva et al.Secure multi-party non-repudiation protocols and applications
KomarWindows server 2008 PKI and Certificate security
Yeh et al.Applying lightweight directory access protocol service on session certification authority
Gritzalis, D. Gritzalis, C. Moulinos, J. IliadisAn integrated architecture for deploying a virtual private medical network over the Web
Young et al.Technologies to Support Authentication in Higher Education: A Study for the UK Joint Information Systems Committee, August 21th, 1996
Crispo et al.WWW security and trusted third party services
Rebstock et al.Secure Interactive Electronic Negotiations in Business to Business Marketplaces
YildizA proposal for Turkish government public key infrastructure trust model
van OorschotChanged the World
Tsiakis et al.Identification of trust requirements in an e-business framework.
YaoA security architecture for protecting dynamic components of mobile agents
Kefallinos et al.Secure PKI-enabled e-government infrastructures implementation: the SYZEFXIS-PKI case
TassabehjiSecure use of the Internet by business

[8]ページ先頭

©2009-2025 Movatter.jp