Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








21,334 Hits in 5.4 sec

A performance-aware Public Key Infrastructure for next generation connected aircrafts

Mohamed Slim Ben Mahmoud, Nicolas Larrieu, Alain Pirovano
2010 29th Digital Avionics Systems Conference  
The purpose behind the project is to demonstrate the feasibility of highcapacity aircraft-earth communications through a low-cost satellite antenna technology.  ...  The proposed PKI is also used to secure a negotiation protocol for the supported and common security mechanisms between two end entities.  ...  Acknowledgements We would like to thank Nicolas Staut and Antoine Saltel, students at ENAC for their help and involvement in the performance analysis. Email Addresses  ... 
doi:10.1109/dasc.2010.5655369 fatcat:smxjd5c4izhv7ixcymzbshnqq4

Fast Digital Certificate Revocation [chapter]

Vipul Goyal
2004 Security and Protection in Information Processing Systems  
Digital Certificates are central to the concept of Public Key Infrastructures (PKI) and serve as a cryptographic proof of one's public key.  ...  We briefly discuss the existing certificate revocation techniques and then present a new online revocation technique.  ...  Online Revocation Mechanisms As a response to the low timeliness of some periodically updated certificate revocation schemes, protocols for online status checking have been developed.  ... 
doi:10.1007/1-4020-8143-x_32 dblp:conf/sec/Goyal04 fatcat:fnahrloxrbhxpjwsaz56gzuipi

Secure group communication in wireless mesh networks

Jing Dong, Kurt Erik Ackermann, Cristina Nita-Rotaru
2008 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks  
Wireless mesh networks (WMNs) have emerged as a promising technology that offers low-cost community wireless services.  ...  The community-oriented nature of WMNs facilitates group applications, such as webcast, distance learning, online gaming, video conferencing, and multimedia broadcasting.  ...  focus the analysis on the cost of the communication among wireless routers.  ... 
doi:10.1109/wowmom.2008.4594843 dblp:conf/wowmom/DongAN08 fatcat:2px7pub3ezcjxgcopzrt2j3xsy

Secure group communication in wireless mesh networks

Jing Dong, Kurt Ackermann, Cristina Nita-Rotaru
2009 Ad hoc networks  
Wireless mesh networks (WMNs) have emerged as a promising technology that offers low-cost community wireless services.  ...  The community-oriented nature of WMNs facilitates group applications, such as webcast, distance learning, online gaming, video conferencing, and multimedia broadcasting.  ...  focus the analysis on the cost of the communication among wireless routers.  ... 
doi:10.1016/j.adhoc.2009.03.004 fatcat:r2wulxhyzjcpjhlu5jq23gfxca

Trusted Principal-Hosted Certificate Revocation [chapter]

Sufatrio, Roland H. C. Yap
2011 IFIP Advances in Information and Communication Technology  
Public Key Infrastructure is a key infrastructure for secure and trusted communication on the Internet.  ...  This paper revisits the problem of providing timely certificate revocation focusing on the needs of mobile devices.  ...  OCSP [5] was proposed to provide more timely certificate status checking. It returns the status of an inquired certificate in an online fashion.  ... 
doi:10.1007/978-3-642-22200-9_15 fatcat:6even2awazc4nflnauvd4b7jje

DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks

Jun Luo, J.-P. Hubaux, P.T. Eugster
2005 IEEE Transactions on Dependable and Secure Computing  
We propose a solution, called DICTATE (DIstributed CerTification Authority with probabilisTic frEshness), to manage the dCA.  ...  Our contribution is twofold: 1) a set of certificate management protocols that allow trading protocol overhead for certificate freshness or the other way around, and 2) a combination of threshold and identity-based  ...  This work was supported (in part) by National Competence Center in Research on Mobile Information and Communication Systems (NCCR-MICS), a center supported by the Swiss National Science Foundation under  ... 
doi:10.1109/tdsc.2005.49 fatcat:3i7fd3eqhna3vdvvrdvzhmpvge

BECSI: Bandwidth Efficient Certificate Status Information Distribution Mechanism for VANETs

Carlos Gañán, Jose L. Muñoz, Oscar Esparza, Jonathan Loo, Jorge Mata-Díaz, Juanjo Alins
2013 Mobile Information Systems  
In this article, we propose BECSI, aBandwidth Efficient Certificate Status Informationmechanism to efficiently distributecertificate status information (CSI) in VANETs.By means of Merkle hash trees (MHT  ...  (PKI) will provide this functionality by means of certificate revocation lists (CRLs).When a certificate authority (CA)needs to revoke a certificate, itglobally distributes CRLs.Transmitting these lists  ...  Thus, online certificate status protocol (OCSP) [28] or, in general, any online solution is not suitable for this context. Several CRLs distribution protocols have been proposed for this purpose.  ... 
doi:10.1155/2013/139246 fatcat:ftqiq5qayrdvbinzexl22ouwqq

A Secure Cloud Migration, Monitoring and Analytics Framework for Industrial Internet of Things

Rafiullah Khan, Kieran McLaughlin, BooJoong Kang, David Laverty, Sakir Sezer
2020 2020 IEEE 6th World Forum on Internet of Things (WF-IoT)  
To bridge the technological gap between legacy and state-of-theart equipment, authors in [8] proposed a low-cost gateway with protocols translation feature.  ...  Due to outdated and insecure protocols used by legacy equipment, a low-cost cloud migration approach needs to be investigated while ensuring system safety and security.  ... 
doi:10.1109/wf-iot48130.2020.9221106 dblp:conf/wf-iot/KhanMKLS20 fatcat:irknwyj6tndlhfjhfi2s5vi7me

A certificate revocation scheme for wireless ad hoc networks

Claude Crépeau, Carlton R. Davis
2003 Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks - SASN '03  
In this paper, we propose a certificate revocation scheme for wireless ad hoc networks.  ...  Consider for example the difficulty associated with the use of digital certificates in ad hoc networks.  ...  Alternatively, online certificate status protocol (OCSP) [23] , can be used to ascertain information about the status of a certificate.  ... 
doi:10.1145/986858.986866 dblp:conf/sasn/CrepeauD03 fatcat:sxwbuw4vsfah3lqzj6b76dslr4

Certificate Revocation Using Fine Grained Certificate Space Partitioning [chapter]

Vipul Goyal
2007 Lecture Notes in Computer Science  
Our scheme aims to strike the right balance between CA to directory communication costs and query costs by carefully selecting the number of partitions.  ...  Each partition contains the status of a set of certificates. A partition may either expire or be renewed at the end of a time slot. This is done efficiently using hash chains.  ...  Another technique for certificate revocation is the Online Certificate Status Protocol (OCSP) [OCSrg] designed by IETF.  ... 
doi:10.1007/978-3-540-77366-5_24 fatcat:cww4bfkw3rcx7jx5cb4ycb2k2a

Towards a More Secure and Scalable Verifying PKI of eMRTD [chapter]

Nicolas Buchmann, Harald Baier
2014 Lecture Notes in Computer Science  
Instead of creating new protocols, we focus on solutions, which are based on well-known protocols from the Internet domain like the Network Time Protocol (NTP), the Online Certificate Status Protocol (  ...  In addition to these Internet protocols we evaluate state-of-the-art security protocols proposed by the scientific community, e.g., the Hoepman protocol, the BioPACE V2 protocol and the On-line Secure  ...  SEC-2011-284862) and CASED.  ... 
doi:10.1007/978-3-642-53997-8_7 fatcat:vl4z6dtjb5gmrkk4rw6tvdkptm

Towards a more secure and scalable verifying PKI of eMRTD

Nicolas Buchmann, Harald Baier
2014 Journal of Computer Security  
Instead of creating new protocols, we focus on solutions, which are based on well-known protocols from the Internet domain like the Network Time Protocol (NTP), the Online Certificate Status Protocol (  ...  In addition to these Internet protocols we evaluate state-of-the-art security protocols proposed by the scientific community, e.g., the Hoepman protocol, the BioPACE V2 protocol and the On-line Secure  ...  SEC-2011-284862) and CASED.  ... 
doi:10.3233/jcs-140522 fatcat:xquxc2tsxzhrdkvcidu2z2fmcm

User-aided reader revocation in PKI-based RFID systems*

Rishab Nithyanand, Gene Tsudik, Ersin Uzun, Dimitris Gritzalis
2011 Journal of Computer Security  
In this paper, we argue that one of the prominent challenges is how to handle revocation and expiration checking of RFID reader certificates.  ...  We take advantage of the user's awareness and presence to construct a simple, efficient, secure and (most importantly) feasible solution.  ...  Acknowledgments: The authors are grateful to Bruno Crispo, Markus Ullman and the anonymous reviewers of ESORICS 2010 for their valuable comments on the preliminary version of this paper.  ... 
doi:10.3233/jcs-2011-0435 fatcat:h5phzfubzba6deodtozr3nugby

Readers Behaving Badly [chapter]

Rishab Nithyanand, Gene Tsudik, Ersin Uzun
2010 Lecture Notes in Computer Science  
In this paper, we argue that one of the prominent challenges is how to handle revocation and expiration checking of RFID reader certificates.  ...  We take advantage of the user's awareness and presence to construct a simple, efficient, secure and (most importantly) feasible solution.  ...  The authors are grateful to Bruno Crispo and Markus Ullman for their valuable comments on the previous version of this paper. This work is supported in part by NSF Cybertrust grant #0831526.  ... 
doi:10.1007/978-3-642-15497-3_2 fatcat:g3xx356dknh7nmiajmbyivtsti

CR-BA: Public Key Infrastructure Certificate Revocation Scheme Based on Blockchain and Accumulator

Jingxue Xie, Xinghong Tan, Liang Tan, Jiewu Leng
2022 Security and Communication Networks  
Second, as the number of revoked certificates increases, the misjudgment rate of certificate status will increase accordingly, so a public key infrastructure implementation certificate revocation scheme  ...  Finally, when the user needs to verify the status of the certificate, CA calculates the revocation fingerprint according to the revocation factor on the certificate, then compares it with the existing  ...  Acknowledgments is work was supported in part by the National Natural Science Foundation of China, under Grant no. 61373162, and Sichuan Provincial Science and Technology Department Project, under Grant  ... 
doi:10.1155/2022/2069195 fatcat:66ejha2rxzcytjhb55ew2wxjne
« Previous Showing results 1 — 15 out of 21,334 results