Blockchain-based certificate transparency and revocation transparency

Z Wang, J Lin, Q Cai, Q Wang, D Zha… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Traditional X. 509 public key infrastructures (PKIs) depend on trusted certification authorities
(CAs) to sign certificates, used in SSL/TLS to authenticate web servers and establish secure …

When HTTPS meets CDN: A case of authentication in delegated service

J Liang, J Jiang, H Duan, K Li, T Wan… - 2014 IEEE Symposium …, 2014 - ieeexplore.ieee.org
Content Delivery Network (CDN) and Hypertext Transfer Protocol Secure (HTTPS) are two
popular but independent web technologies, each of which has been well studied …

[PDF][PDF] PKI 技术的近年研究综述

林璟锵, 荆继武, 张琼露, 王展 - 密码学报, 2015 - jcr.cacrnet.org.cn
公钥基础设施(Public Key Infrastructure, PKI) 是典型的密码应用技术. 在PKI 系统中,
由证书认证机构(Certification Authority, CA) 签发数字证书, 绑定PKI 用户的身份信息和公钥 …

Survivable key compromise in software update systems

J Samuel, N Mathewson, J Cappos… - Proceedings of the 17th …, 2010 - dl.acm.org
Today's software update systems have little or no defense against key compromise. As a
result, key compromises have put millions of software update clients at risk. Here we identify …

TARP: Ticket-based address resolution protocol

W Lootah, W Enck, P McDaniel - Computer networks, 2007 - Elsevier
IP networks fundamentally rely on the Address Resolution Protocol (ARP) for proper
operation. Unfortunately, vulnerabilities in ARP enable a raft of Internet Protocol (IP)-based …

Integrating trust measures in multiagent systems

D Rosaci, GML Sarné… - International Journal of …, 2012 - Wiley Online Library
Several models have been proposed in the past for representing both reliability and
reputation. However, we remark that a crucial point in the practical use of these two …

Fine-grained control of security capabilities

D Boneh, X Ding, G Tsudik - ACM Transactions on Internet Technology …, 2004 - dl.acm.org
We present a new approach for fine-grained control over users' security privileges (fast
revocation of credentials) centered around the concept of an on-line semi-trusted mediator …

Blockchain Technology: Intrinsic Technological and Socio-Economic Barriers: FDSE'2020 Keynote

A Buldas, D Draheim, T Nagumo… - Future Data and Security …, 2020 - Springer
Since the introduction of Bitcoin in 2009 and its immense resonance in media, we have seen
a plethora of envisioned blockchain solutions. Usually, such blockchain solutions claim to be …

Intelligent trust-based public-key management for IoT by linking edge devices in a fog architecture

MS Haghighi, M Ebrahimi, S Garg… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Due to memory and processing limitations, Internet-of-Things (IoT) devices require external
fog servers to perform some of their tasks. However, this offloading of tasks comes at the cost …

A response to “can we eliminate certificate revocation lists?”

P McDaniel, A Rubin - … : 4th International Conference, FC 2000 Anguilla …, 2001 - Springer
The massive growth of electronic commerce on the Internet heightens concerns over the
lack of meaningful certificate management. One issue limiting the availability of such …