User Certificate

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 4641 Experts worldwide ranked by ideXlab platform

Xuri Chen - One of the best experts on this subject based on the ideXlab platform.

  • study on User Certificate in public key infrastructure with high efficiency and robust
    International Conference on Computer Science and Information Technology, 2008
    Co-Authors: Xiangdong Yin, Xuri Chen
    Abstract:

    PKI (public key infrastructure) bases on cryptography as its theoretic fundamental, it provides identity authentication, confidentiality, integral and non-repudiation service, it is the important credible and authorized safety platform of network application and it provides information safety assurance for network activities. The paper designs User Certificate in PKI, mainly discusses potential safety hazard and efficiency for User Certificate in PKI, and on the basic of which, it advances design proposal for User Certificate in PKI, and finally it realizes the proposal and makes brief analysis for its performance.

B I Hongjun - One of the best experts on this subject based on the ideXlab platform.

  • User Certificate management system based on open ssl
    Information Security and Communications Privacy, 2008
    Co-Authors: B I Hongjun
    Abstract:

    This paper, based on the security need of network, presents the PKI concept. Then it describes the PKI system structure and its application in User Certificate applied, and carried on introduction to the customer's Certificate management, finally, based on the PKI related theories and OpenSSL tool, Modular mode for development is employed, a small-size User Certificate management system is simulated and realized.

Xiangdong Yin - One of the best experts on this subject based on the ideXlab platform.

  • study on User Certificate in public key infrastructure with high efficiency and robust
    International Conference on Computer Science and Information Technology, 2008
    Co-Authors: Xiangdong Yin, Xuri Chen
    Abstract:

    PKI (public key infrastructure) bases on cryptography as its theoretic fundamental, it provides identity authentication, confidentiality, integral and non-repudiation service, it is the important credible and authorized safety platform of network application and it provides information safety assurance for network activities. The paper designs User Certificate in PKI, mainly discusses potential safety hazard and efficiency for User Certificate in PKI, and on the basic of which, it advances design proposal for User Certificate in PKI, and finally it realizes the proposal and makes brief analysis for its performance.

Waldvogel Marcel - One of the best experts on this subject based on the ideXlab platform.

  • X.509 User Certificate-based Two-Factor Authentication for Web Applications
    2017
    Co-Authors: Zink Thomas, Waldvogel Marcel
    Abstract:

    An appealing property to researchers, educators, and students is the openness of the physical environment and IT infrastructure of their organizations. However, to the IT administration, this creates challenges way beyond those of a single-purpose business or administration. Especially the personally identifiable information or the power of the critical functions behind these logins, such as financial transactions or manipulating User accounts, require extra protection in the heterogeneous educational environment with single-sign-on. However, most web-based environments still lack a reasonable second-factor protection or at least the enforcement of it for privileged operations without hindering normal usage.In this paper we introduce a novel and surprisingly simple yet extremely flexible way to implement two-factor authentication based on X.509 User Certificates in web applications. Our solution requires only a few lines of code in web server configuration and none in the application source code for basic protection. Furthermore, since it is based on X.509 Certificates, it can be easily combined with smartcards or USB cryptotokens to further enhance security.publishe

Zink Thomas - One of the best experts on this subject based on the ideXlab platform.

  • X.509 User Certificate-based Two-Factor Authentication for Web Applications
    2017
    Co-Authors: Zink Thomas, Waldvogel Marcel
    Abstract:

    An appealing property to researchers, educators, and students is the openness of the physical environment and IT infrastructure of their organizations. However, to the IT administration, this creates challenges way beyond those of a single-purpose business or administration. Especially the personally identifiable information or the power of the critical functions behind these logins, such as financial transactions or manipulating User accounts, require extra protection in the heterogeneous educational environment with single-sign-on. However, most web-based environments still lack a reasonable second-factor protection or at least the enforcement of it for privileged operations without hindering normal usage.In this paper we introduce a novel and surprisingly simple yet extremely flexible way to implement two-factor authentication based on X.509 User Certificates in web applications. Our solution requires only a few lines of code in web server configuration and none in the application source code for basic protection. Furthermore, since it is based on X.509 Certificates, it can be easily combined with smartcards or USB cryptotokens to further enhance security.publishe