Results 151 to 160 of about 21,725 (207)
Some of the next articles are maybe not open access.
PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI
Future generations computer systems, 2019Recent years have witnessed tremendous academic efforts and industry growth in Internet of Things (IoT). Security issues of IoT have become increasingly prominent. Public Key Infrastructure (PKI) can provide authentication service to IoT devices which is
Wenbo Jiang +5 more
semanticscholar +1 more source
Implementing a Smart Contract PKI
IEEE transactions on engineering management, 2020Public key infrastructures (PKIs) provide the foundations for securing Internet communications. Currently, PKIs are operated by centralized authorities, which have been involved in numerous security incidents.
Christos Patsonakis +3 more
semanticscholar +1 more source
BB-PKI: Blockchain-Based Public Key Infrastructure Certificate Management
2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), 2020Recently, real-world attacks against the web Public Key Infrastructure (PKI) have arisen more frequently. The current PKI that use Registration Authorities/Certificate Authorities (RAs/CAs) model suffer from notorious security vulnerabilities.
Abba Garba +3 more
semanticscholar +1 more source
Blockchain based PKI and Certificates Management in Mobile Networks
International Conference on Trust, Security and Privacy in Computing and Communications, 2020Some issues such as CRL/OCSP (Certificate Revocation List / Online Certificate Status Protocol) unavailable, previsioned trust anchor unavailable, high communication load arise when PKI (Public Key Infrastructure) is leveraged into mobile networks.
Junzhi Yan +4 more
semanticscholar +1 more source
Blockchain-Based PKI Solutions for IoT
International Conference on Communications in Computing, 2018Traditionally, a Certification Authority (CA) is required to sign, manage, verify and revoke public key certificates. Multiple CAs together form the CA-based Public Key Infrastructure (PKI).
Ankush Singla, E. Bertino
semanticscholar +1 more source
Cancer Letters, 2019
Bone metastasis causes bone pain and pathological bone fracture in breast cancer patients with a serious complication. Previous studies have demonstrated that a novel phosphatidyl inositol 3-kinase (PI3K)-mTOR inhibitor PKI-402 suppressed the growth of ...
Guixin Yuan +11 more
semanticscholar +1 more source
Bone metastasis causes bone pain and pathological bone fracture in breast cancer patients with a serious complication. Previous studies have demonstrated that a novel phosphatidyl inositol 3-kinase (PI3K)-mTOR inhibitor PKI-402 suppressed the growth of ...
Guixin Yuan +11 more
semanticscholar +1 more source
Cecoin: A decentralized PKI mitigating MitM attacks
Future generations computer systems, 2017For numerous applications, it is essential to reliably link a public key with its owner. The current solution is to employ the well-known Public Key Infrastructure (PKI), represented by a trusted certificate authority (CA), to fulfill this assignment by ...
Bo Qin +5 more
semanticscholar +1 more source
Trust Enhancement Scheme for Cross Domain Authentication of PKI System
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019Public Key Infrastructure (PKI) has been popularized in many scenarios such as e-government applications, enterprises, etc. Due to the construction of PKI system of various regions and departments, there formed a lot of isolated PKI management domains ...
Yuxiang Chen +5 more
semanticscholar +1 more source
A Complete Study of P.K.I. (PKI’s Known Incidents)
Social Science Research Network, 2019In this work, we report on a comprehensive analysis of PKI resulting from Certificate Authorities’ (CAs) behavior using over 1300 instances. We found several cases where CAs designed business models that favored the issuance of digital certificates over ...
Nicolás Serrano, Hilda Hadan, L. Camp
semanticscholar +1 more source
A Scalable and Efficient PKI Based Authentication Protocol for VANETs
International Telecommunication Networks and Applications Conference, 2018Intelligent Transportation System (ITS) has came up as important solution for safety of automotive users. ITS deployment in near future will not only improve drivers and passengers safety but also will reduce road safety and traffic congestion problems ...
M. Asghar, R. Doss, Lei Pan
semanticscholar +1 more source

