Results 191 to 200 of about 23,446 (211)
Some of the next articles are maybe not open access.
Heterogeneous Signcryption Scheme Supporting Equality Test from PKI to CLC toward IoT
Transactions on Emerging Telecommunications Technologies, 2020The prosperity of Internet of Things (IoT) has brought numerous advantages to individuals and organizations. Since the transmission channel is usually considered as untrusted, the notion of signcryption seems to be the desired method to ease the defect ...
Yingzhe Hou +4 more
semanticscholar +1 more source
ChainPKI - Towards Ethash-based Decentralized PKI with Privacy Enhancement
International Conference on Data Science in Cyberspace, 2021Public key infrastructure (PKI) is the most widely adopted framework aiming to protect the communications between servers and clients, by authenticating users and devices in the digital world. In order to mitigate the single point of failure (SPOF) posed
Wei-Yang Chiu, W. Meng, C. Jensen
semanticscholar +1 more source
Implementing a Smart Contract PKI
IEEE transactions on engineering management, 2020Public key infrastructures (PKIs) provide the foundations for securing Internet communications. Currently, PKIs are operated by centralized authorities, which have been involved in numerous security incidents.
Christos Patsonakis +3 more
semanticscholar +1 more source
BB-PKI: Blockchain-Based Public Key Infrastructure Certificate Management
2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), 2020Recently, real-world attacks against the web Public Key Infrastructure (PKI) have arisen more frequently. The current PKI that use Registration Authorities/Certificate Authorities (RAs/CAs) model suffer from notorious security vulnerabilities.
Abba Garba +3 more
semanticscholar +1 more source
Blockchain based PKI and Certificates Management in Mobile Networks
International Conference on Trust, Security and Privacy in Computing and Communications, 2020Some issues such as CRL/OCSP (Certificate Revocation List / Online Certificate Status Protocol) unavailable, previsioned trust anchor unavailable, high communication load arise when PKI (Public Key Infrastructure) is leveraged into mobile networks.
Junzhi Yan +4 more
semanticscholar +1 more source
Blockchain-Based PKI Solutions for IoT
International Conference on Communications in Computing, 2018Traditionally, a Certification Authority (CA) is required to sign, manage, verify and revoke public key certificates. Multiple CAs together form the CA-based Public Key Infrastructure (PKI).
Ankush Singla, E. Bertino
semanticscholar +1 more source
Trust Enhancement Scheme for Cross Domain Authentication of PKI System
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019Public Key Infrastructure (PKI) has been popularized in many scenarios such as e-government applications, enterprises, etc. Due to the construction of PKI system of various regions and departments, there formed a lot of isolated PKI management domains ...
Yuxiang Chen +5 more
semanticscholar +1 more source
A Complete Study of P.K.I. (PKI’s Known Incidents)
Social Science Research Network, 2019In this work, we report on a comprehensive analysis of PKI resulting from Certificate Authorities’ (CAs) behavior using over 1300 instances. We found several cases where CAs designed business models that favored the issuance of digital certificates over ...
Nicolás Serrano, Hilda Hadan, L. Camp
semanticscholar +1 more source
A Scalable and Efficient PKI Based Authentication Protocol for VANETs
International Telecommunication Networks and Applications Conference, 2018Intelligent Transportation System (ITS) has came up as important solution for safety of automotive users. ITS deployment in near future will not only improve drivers and passengers safety but also will reduce road safety and traffic congestion problems ...
M. Asghar, R. Doss, Lei Pan
semanticscholar +1 more source
A Privacy-Aware PKI System Based on Permissioned Blockchains
2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS), 2018Public key infrastructure (PKI) is the foundation and core of network security construction. Blockchain (BC) has many technical characteristics, such as decentralization, impossibility of being tampered with and forged, which makes it have incomparable ...
Rong Wang +5 more
semanticscholar +1 more source

