A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A performance-aware Public Key Infrastructure for next generation connected aircrafts
2010
29th Digital Avionics Systems Conference
The purpose behind the project is to demonstrate the feasibility of highcapacity aircraft-earth communications through a low-cost satellite antenna technology. ...
The proposed PKI is also used to secure a negotiation protocol for the supported and common security mechanisms between two end entities. ...
Acknowledgements We would like to thank Nicolas Staut and Antoine Saltel, students at ENAC for their help and involvement in the performance analysis.
Email Addresses ...
doi:10.1109/dasc.2010.5655369
fatcat:smxjd5c4izhv7ixcymzbshnqq4
Fast Digital Certificate Revocation
[chapter]
2004
Security and Protection in Information Processing Systems
Digital Certificates are central to the concept of Public Key Infrastructures (PKI) and serve as a cryptographic proof of one's public key. ...
We briefly discuss the existing certificate revocation techniques and then present a new online revocation technique. ...
Online Revocation Mechanisms As a response to the low timeliness of some periodically updated certificate revocation schemes, protocols for online status checking have been developed. ...
doi:10.1007/1-4020-8143-x_32
dblp:conf/sec/Goyal04
fatcat:fnahrloxrbhxpjwsaz56gzuipi
Secure group communication in wireless mesh networks
2008
2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks
Wireless mesh networks (WMNs) have emerged as a promising technology that offers low-cost community wireless services. ...
The community-oriented nature of WMNs facilitates group applications, such as webcast, distance learning, online gaming, video conferencing, and multimedia broadcasting. ...
focus the analysis on the cost of the communication among wireless routers. ...
doi:10.1109/wowmom.2008.4594843
dblp:conf/wowmom/DongAN08
fatcat:2px7pub3ezcjxgcopzrt2j3xsy
Secure group communication in wireless mesh networks
2009
Ad hoc networks
Wireless mesh networks (WMNs) have emerged as a promising technology that offers low-cost community wireless services. ...
The community-oriented nature of WMNs facilitates group applications, such as webcast, distance learning, online gaming, video conferencing, and multimedia broadcasting. ...
focus the analysis on the cost of the communication among wireless routers. ...
doi:10.1016/j.adhoc.2009.03.004
fatcat:r2wulxhyzjcpjhlu5jq23gfxca
Trusted Principal-Hosted Certificate Revocation
[chapter]
2011
IFIP Advances in Information and Communication Technology
Public Key Infrastructure is a key infrastructure for secure and trusted communication on the Internet. ...
This paper revisits the problem of providing timely certificate revocation focusing on the needs of mobile devices. ...
OCSP [5] was proposed to provide more timely certificate status checking. It returns the status of an inquired certificate in an online fashion. ...
doi:10.1007/978-3-642-22200-9_15
fatcat:6even2awazc4nflnauvd4b7jje
DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks
2005
IEEE Transactions on Dependable and Secure Computing
We propose a solution, called DICTATE (DIstributed CerTification Authority with probabilisTic frEshness), to manage the dCA. ...
Our contribution is twofold: 1) a set of certificate management protocols that allow trading protocol overhead for certificate freshness or the other way around, and 2) a combination of threshold and identity-based ...
This work was supported (in part) by National Competence Center in Research on Mobile Information and Communication Systems (NCCR-MICS), a center supported by the Swiss National Science Foundation under ...
doi:10.1109/tdsc.2005.49
fatcat:3i7fd3eqhna3vdvvrdvzhmpvge
BECSI: Bandwidth Efficient Certificate Status Information Distribution Mechanism for VANETs
2013
Mobile Information Systems
In this article, we propose BECSI, aBandwidth Efficient Certificate Status Informationmechanism to efficiently distributecertificate status information (CSI) in VANETs.By means of Merkle hash trees (MHT ...
(PKI) will provide this functionality by means of certificate revocation lists (CRLs).When a certificate authority (CA)needs to revoke a certificate, itglobally distributes CRLs.Transmitting these lists ...
Thus, online certificate status protocol (OCSP) [28] or, in general, any online solution is not suitable for this context. Several CRLs distribution protocols have been proposed for this purpose. ...
doi:10.1155/2013/139246
fatcat:ftqiq5qayrdvbinzexl22ouwqq
A Secure Cloud Migration, Monitoring and Analytics Framework for Industrial Internet of Things
2020
2020 IEEE 6th World Forum on Internet of Things (WF-IoT)
To bridge the technological gap between legacy and state-of-theart equipment, authors in [8] proposed a low-cost gateway with protocols translation feature. ...
Due to outdated and insecure protocols used by legacy equipment, a low-cost cloud migration approach needs to be investigated while ensuring system safety and security. ...
doi:10.1109/wf-iot48130.2020.9221106
dblp:conf/wf-iot/KhanMKLS20
fatcat:irknwyj6tndlhfjhfi2s5vi7me
A certificate revocation scheme for wireless ad hoc networks
2003
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks - SASN '03
In this paper, we propose a certificate revocation scheme for wireless ad hoc networks. ...
Consider for example the difficulty associated with the use of digital certificates in ad hoc networks. ...
Alternatively, online certificate status protocol (OCSP) [23] , can be used to ascertain information about the status of a certificate. ...
doi:10.1145/986858.986866
dblp:conf/sasn/CrepeauD03
fatcat:sxwbuw4vsfah3lqzj6b76dslr4
Certificate Revocation Using Fine Grained Certificate Space Partitioning
[chapter]
2007
Lecture Notes in Computer Science
Our scheme aims to strike the right balance between CA to directory communication costs and query costs by carefully selecting the number of partitions. ...
Each partition contains the status of a set of certificates. A partition may either expire or be renewed at the end of a time slot. This is done efficiently using hash chains. ...
Another technique for certificate revocation is the Online Certificate Status Protocol (OCSP) [OCSrg] designed by IETF. ...
doi:10.1007/978-3-540-77366-5_24
fatcat:cww4bfkw3rcx7jx5cb4ycb2k2a
Towards a More Secure and Scalable Verifying PKI of eMRTD
[chapter]
2014
Lecture Notes in Computer Science
Instead of creating new protocols, we focus on solutions, which are based on well-known protocols from the Internet domain like the Network Time Protocol (NTP), the Online Certificate Status Protocol ( ...
In addition to these Internet protocols we evaluate state-of-the-art security protocols proposed by the scientific community, e.g., the Hoepman protocol, the BioPACE V2 protocol and the On-line Secure ...
SEC-2011-284862) and CASED. ...
doi:10.1007/978-3-642-53997-8_7
fatcat:vl4z6dtjb5gmrkk4rw6tvdkptm
Towards a more secure and scalable verifying PKI of eMRTD
2014
Journal of Computer Security
Instead of creating new protocols, we focus on solutions, which are based on well-known protocols from the Internet domain like the Network Time Protocol (NTP), the Online Certificate Status Protocol ( ...
In addition to these Internet protocols we evaluate state-of-the-art security protocols proposed by the scientific community, e.g., the Hoepman protocol, the BioPACE V2 protocol and the On-line Secure ...
SEC-2011-284862) and CASED. ...
doi:10.3233/jcs-140522
fatcat:xquxc2tsxzhrdkvcidu2z2fmcm
User-aided reader revocation in PKI-based RFID systems*
2011
Journal of Computer Security
In this paper, we argue that one of the prominent challenges is how to handle revocation and expiration checking of RFID reader certificates. ...
We take advantage of the user's awareness and presence to construct a simple, efficient, secure and (most importantly) feasible solution. ...
Acknowledgments: The authors are grateful to Bruno Crispo, Markus Ullman and the anonymous reviewers of ESORICS 2010 for their valuable comments on the preliminary version of this paper. ...
doi:10.3233/jcs-2011-0435
fatcat:h5phzfubzba6deodtozr3nugby
Readers Behaving Badly
[chapter]
2010
Lecture Notes in Computer Science
In this paper, we argue that one of the prominent challenges is how to handle revocation and expiration checking of RFID reader certificates. ...
We take advantage of the user's awareness and presence to construct a simple, efficient, secure and (most importantly) feasible solution. ...
The authors are grateful to Bruno Crispo and Markus Ullman for their valuable comments on the previous version of this paper. This work is supported in part by NSF Cybertrust grant #0831526. ...
doi:10.1007/978-3-642-15497-3_2
fatcat:g3xx356dknh7nmiajmbyivtsti
CR-BA: Public Key Infrastructure Certificate Revocation Scheme Based on Blockchain and Accumulator
2022
Security and Communication Networks
Second, as the number of revoked certificates increases, the misjudgment rate of certificate status will increase accordingly, so a public key infrastructure implementation certificate revocation scheme ...
Finally, when the user needs to verify the status of the certificate, CA calculates the revocation fingerprint according to the revocation factor on the certificate, then compares it with the existing ...
Acknowledgments is work was supported in part by the National Natural Science Foundation of China, under Grant no. 61373162, and Sichuan Provincial Science and Technology Department Project, under Grant ...
doi:10.1155/2022/2069195
fatcat:66ejha2rxzcytjhb55ew2wxjne
« Previous
Showing results 1 — 15 out of 21,334 results