PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem [PDF]
In a public-key infrastructure (PKI), clients must have an efficient and secure way to determine whether a certificate was revoked (by an entity considered as legitimate to do so), while preserving user privacy.
Chuat, Laurent +2 more
core +2 more sources
PKI Interoperability: Still an Issue? A Solution in the X. 509 Realm [PDF]
There exist many obstacles that slow the global adoption of public key infrastructure (PKI) technology. The PKI interoperability problem, being poorly understood, is one of the most confusing.
A. Martínez-Nadal +7 more
core +2 more sources
X.509 certificate error testing [PDF]
X.509 Certificates are used by a wide range of technologies to verify identities, while the SSL protocol is used to provide a secure encrypted tunnel through which data can be sent over a public network.
Jimenez M., Momani E. M. H., Toma C
core +2 more sources
Efficient asynchronous accumulators for distributed PKI [PDF]
Cryptographic accumulators are a tool for compact set representation and secure set membership proofs. When an element is added to a set by means of an accumulator, a membership witness is generated. This witness can later be used to prove the membership
Yakoubov, Sophia
core +2 more sources
MixEth: Efficient, Trustless Coin Mixing Service for Ethereum [PDF]
Coin mixing is a prevalent privacy-enhancing technology for cryptocurrency users. In this paper, we present MixEth, which is a trustless coin mixing service for Turing-complete blockchains.
, , Buckland, Chris
core +1 more source
Post-Keynesian institutionalism after the great recession [PDF]
This paper surveys the context and contours of contemporary Post-Keynesian Institutionalism (PKI). It begins by reviewing recent criticism of conventional economics by prominent economists as well as examining, within the current context, important ...
Whalen, Charles J.
core +2 more sources
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security [PDF]
Recently, a variant of proxy re-encryption, named conditional proxy re-encryption (C-PRE), has been introduced. Compared with traditional proxy re-encryption, C-PRE enables the delegator to implement fine-grained delegation of decryption rights, and thus
B. Libert +15 more
core +5 more sources
An almost cyclic 2-coordinate descent method for singly linearly constrained problems [PDF]
A block decomposition method is proposed for minimizing a (possibly non-convex) continuously differentiable function subject to one linear equality constraint and simple bounds on the variables.
Cristofari, Andrea
core +2 more sources
Kinetics and Inhibition Studies of the L205R Mutant of cAMP-Dependent Protein Kinase Involved in Cushing’s Syndrome [PDF]
Overproduction of cortisol by the hypothalamus–pituitary–adrenal hormone system results in the clinical disorder known as Cushing\u27s syndrome. Genomics studies have identified a key mutation (L205R) in the α‐isoform of the catalytic subunit of cAMP ...
Ellis, Keith C. +3 more
core +2 more sources
Elevated intracellular cAMP exacerbates vulnerability to oxidative stress in optic nerve head astrocytes. [PDF]
Glaucoma is characterized by a progressive loss of retinal ganglion cells and their axons, but the underlying biological basis for the accompanying neurodegeneration is not known.
Bu, Jung Hyun +8 more
core +2 more sources

