Results 191 to 200 of about 23,446 (211)
Some of the next articles are maybe not open access.

Heterogeneous Signcryption Scheme Supporting Equality Test from PKI to CLC toward IoT

Transactions on Emerging Telecommunications Technologies, 2020
The prosperity of Internet of Things (IoT) has brought numerous advantages to individuals and organizations. Since the transmission channel is usually considered as untrusted, the notion of signcryption seems to be the desired method to ease the defect ...
Yingzhe Hou   +4 more
semanticscholar   +1 more source

ChainPKI - Towards Ethash-based Decentralized PKI with Privacy Enhancement

International Conference on Data Science in Cyberspace, 2021
Public key infrastructure (PKI) is the most widely adopted framework aiming to protect the communications between servers and clients, by authenticating users and devices in the digital world. In order to mitigate the single point of failure (SPOF) posed
Wei-Yang Chiu, W. Meng, C. Jensen
semanticscholar   +1 more source

Implementing a Smart Contract PKI

IEEE transactions on engineering management, 2020
Public key infrastructures (PKIs) provide the foundations for securing Internet communications. Currently, PKIs are operated by centralized authorities, which have been involved in numerous security incidents.
Christos Patsonakis   +3 more
semanticscholar   +1 more source

BB-PKI: Blockchain-Based Public Key Infrastructure Certificate Management

2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), 2020
Recently, real-world attacks against the web Public Key Infrastructure (PKI) have arisen more frequently. The current PKI that use Registration Authorities/Certificate Authorities (RAs/CAs) model suffer from notorious security vulnerabilities.
Abba Garba   +3 more
semanticscholar   +1 more source

Blockchain based PKI and Certificates Management in Mobile Networks

International Conference on Trust, Security and Privacy in Computing and Communications, 2020
Some issues such as CRL/OCSP (Certificate Revocation List / Online Certificate Status Protocol) unavailable, previsioned trust anchor unavailable, high communication load arise when PKI (Public Key Infrastructure) is leveraged into mobile networks.
Junzhi Yan   +4 more
semanticscholar   +1 more source

Blockchain-Based PKI Solutions for IoT

International Conference on Communications in Computing, 2018
Traditionally, a Certification Authority (CA) is required to sign, manage, verify and revoke public key certificates. Multiple CAs together form the CA-based Public Key Infrastructure (PKI).
Ankush Singla, E. Bertino
semanticscholar   +1 more source

Trust Enhancement Scheme for Cross Domain Authentication of PKI System

International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019
Public Key Infrastructure (PKI) has been popularized in many scenarios such as e-government applications, enterprises, etc. Due to the construction of PKI system of various regions and departments, there formed a lot of isolated PKI management domains ...
Yuxiang Chen   +5 more
semanticscholar   +1 more source

A Complete Study of P.K.I. (PKI’s Known Incidents)

Social Science Research Network, 2019
In this work, we report on a comprehensive analysis of PKI resulting from Certificate Authorities’ (CAs) behavior using over 1300 instances. We found several cases where CAs designed business models that favored the issuance of digital certificates over ...
Nicolás Serrano, Hilda Hadan, L. Camp
semanticscholar   +1 more source

A Scalable and Efficient PKI Based Authentication Protocol for VANETs

International Telecommunication Networks and Applications Conference, 2018
Intelligent Transportation System (ITS) has came up as important solution for safety of automotive users. ITS deployment in near future will not only improve drivers and passengers safety but also will reduce road safety and traffic congestion problems ...
M. Asghar, R. Doss, Lei Pan
semanticscholar   +1 more source

A Privacy-Aware PKI System Based on Permissioned Blockchains

2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS), 2018
Public key infrastructure (PKI) is the foundation and core of network security construction. Blockchain (BC) has many technical characteristics, such as decentralization, impossibility of being tampered with and forged, which makes it have incomparable ...
Rong Wang   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy