Results 21 to 30 of about 1,346,642 (294)
A robust self-organized public key management for mobile ad hoc networks [PDF]
A mobile ad hoc network (MANET) is a self-organized wireless network where mobile nodes can communicate with each other without the use of any existing network infrastructure or centralized administration. Trust establishment and management are essential
Capkun +14 more
core +1 more source
Trust Model for the Russian Federation Digital Economy
The paper presents a study of modern trust models based on the Public Key Infrastructure (PKI) infrastructure, the purpose of which is to develop a Russian national trust model.
Dmitry A. Melnikov +2 more
doaj +1 more source
INTEGRITY MONITORING IMPLEMENTATION FOR THE OPERATING SYSTEM IMAGE LOADED THROUGH A NETWORK TO THE THIN CLIENT [PDF]
The paper deals with the problem of protection for the process of operating system loading from the server to the diskless workstation through a network and the analysis of the existing ways of integrity monitoring for information transferred under ...
Y. A. Gatchin, O. A. Teploukhova
doaj +1 more source
Crypto-test-lab for security validation of ECC co-processor test infrastructure [PDF]
© 20xx IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting /republishing this material for advertising or promotional purposes, creating new ...
Lupón Roses, Emilio +2 more
core +1 more source
Cross-Certification Towards Distributed Authentication Infrastructure: A Case of Hyperledger Fabric
In Internet of Things ecosystems, where various entities trade data and data analysis results, public key infrastructure plays an important role in establishing trust relationships between these entities to specify who trusts whose private keys.
Shohei Kakei +5 more
doaj +1 more source
Attribute-Based Encryption in Securing Big Data from Post-Quantum Perspective: A Survey
Attribute-based encryption (ABE) cryptography is widely known for its potential to solve the scalability issue of recent public key infrastructure (PKI).
Zulianie Binti Jemihin +2 more
doaj +1 more source
Transitioning to a Hyperledger Fabric Quantum-Resistant Classical Hybrid Public Key Infrastructure
This research has two parts; the first is to identify enterprise Hyperledger Fabric (HLF) blockchain cybersecurity vulnerabilities, threats, and legal obligations in a Post-Quantum Cryptography (PQC) world.
Robert Campbell
doaj +1 more source
The decentralization feature of public and private blockchain-based applications is achieved by selecting different nodes as validators or Certificate Authority ( $CA$ ) for each transaction.
Amrutanshu Panigrahi +4 more
doaj +1 more source
BlockPKI: An Automated, Resilient, and Transparent Public-Key Infrastructure
This paper describes BlockPKI, a blockchain-based public-key infrastructure that enables an automated, resilient, and transparent issuance of digital certificates.
Chuat, Laurent +3 more
core +1 more source
X.509 certificate error testing [PDF]
X.509 Certificates are used by a wide range of technologies to verify identities, while the SSL protocol is used to provide a secure encrypted tunnel through which data can be sent over a public network.
Jimenez M., Momani E. M. H., Toma C
core +2 more sources

