Gogna, 2018
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| US9225525B2 (en) | Identity management certificate operations | |
| US7844816B2 (en) | Relying party trust anchor based public key technology framework | |
| US8898457B2 (en) | Automatically generating a certificate operation request | |
| CN110958229A (en) | Credible identity authentication method based on block chain | |
| KR100953095B1 (en) | Super peer based P2P network system and peer authentication method | |
| Al-Janabi et al. | Public-key cryptography enabled kerberos authentication | |
| US8751792B2 (en) | Method and system for entity public key acquiring, certificate validation and authentication by introducing an online credible third party | |
| WO2014069985A1 (en) | System and method for identity-based entity authentication for client-server communications | |
| CN114036472B (en) | Kerberos and PKI security inter-domain cross-domain authentication method based on alliance chain | |
| Downnard | Public-key cryptography extensions into Kerberos | |
| Lim et al. | A dynamic key infrastructure for GRID | |
| EP3954083B1 (en) | Establishing secure communication without local time information | |
| Patra et al. | Hierarchical identity based cryptography for end-to-end security in DTNs | |
| Gogna | COMPARISON OF X. 509, KERBEROS 5 AND PKINIT FOR OPEN DISTRIBUTED NETWORK | |
| KR20040002036A (en) | Simple Binding Authorization Method for Strengthening Security | |
| Kumar et al. | A Novel Collaborative PKI Framework in Public Cloud | |
| CN114915494B (en) | A method, system, device and storage medium for anonymous authentication | |
| Ko et al. | Viotsoc: Controlling access to dynamically virtualized iot services using service object capability | |
| Kanungo | Identity authentication in heterogeneous computing environments: a comparative study for an integrated framework | |
| Gogna et al. | and Interoperability Scheme | |
| Eie | Authentication in protected core networking | |
| Argyroudis et al. | Comparing the costs of public key authentication infrastructures | |
| Ahsant et al. | Security credential mapping in grids | |
| Shankar | Computer and Network Security CMSC 414 STANDARDS | |
| Basin et al. | Certificates and Public Key Cryptography |