Research on artificial intelligence enhancing internet of things security: A survey

H Wu, H Han, X Wang, S Sun - Ieee Access, 2020 - ieeexplore.ieee.org
Through three development routes of authentication, communication, and computing, the
Internet of Things (IoT) has become a variety of innovative integrated solutions for specific …

COCA: A secure distributed online certification authority

L Zhou, FB Schneider, R Van Renesse - ACM Transactions on Computer …, 2002 - dl.acm.org
COCA is a fault-tolerant and secure online certification authority that has been built and
deployed both in a local area network and in the Internet. Extremely weak assumptions …

A case for the accountable cloud

A Haeberlen - ACM SIGOPS Operating Systems Review, 2010 - dl.acm.org
For many companies, clouds are becoming an interesting alternative to a dedicated IT
infrastructure. However, cloud computing also carries certain risks for both the customer and …

System and method for certificate exchange

WM Duane, P Röstin - US Patent 7,461,250, 2008 - Google Patents
In an embodiment of a system and method according to the present invention, a chain of one
or more certificates certify ing a principal's public key is exchanged for a single Substi tute …

[PDF][PDF] Privacy and security issues in e-commerce

MS Ackerman, DT Davis Jr - New economy handbook, 2003 - shop.5cmq.com
Privacy–the control over one's personal data–and security–the attempted access to data by
unauthorized others–are two critical problems for both e-commerce consumers and sites …

PKI and digital certification infrastructure

R Hunt - Proceedings. Ninth IEEE International Conference on …, 2001 - ieeexplore.ieee.org
Secure VPN technology is only possible with the use of appropriate security systems such
as encryption, digital signatures, digital certificates, public/private key pairs, non-repudiation …

A blockchain approach to digital archiving: digital signature certification chain preservation

V Bralić, H Stančić, M Stengård - Records Management Journal, 2020 - emerald.com
Purpose The short lifespan of digital signatures presents a challenge to the long-term
preservation of digitally signed records. It can undermine attempts to presume, verify or …

A Survey on the Evolution of RSVP

F Pana, F Put - IEEE Communications Surveys & Tutorials, 2013 - ieeexplore.ieee.org
The Resource Reservation Protocol (RSVP) represents one of the most important protocols
used for resource reservation in the Internet. Developed initially by the Internet Engineering …

Achieving reliable timestamp in the bitcoin platform

G Ma, C Ge, L Zhou - Peer-to-Peer Networking and Applications, 2020 - Springer
Blockchain, the underlying technology of the Bitcoin cryptocurrency, is an innovation of
information technology. The blockchain technology has been widely applied in the evidence …

Technological infrastructure for PKI and digital certification

R Hunt - Computer communications, 2001 - Elsevier
Secure E-Commerce and VPN technology is only possible with the use of appropriate
security systems such as encryption, digital signatures, digital certificates, public/private key …