A survey on X. 509 public-key infrastructure, certificate revocation, and their modern implementation on blockchain and ledger technologies

S Khan, F Luo, Z Zhang, F Ullah, F Amin… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Cyber-attacks are becoming more common against Internet users due to the increasing
dependency on online communication in their daily lives. X. 509 Public-Key Infrastructure …

The Complete Guide to SCION

L Chuat, M Legner, D Basin, D Hausheer, S Hitz… - Information Security and …, 2022 - Springer
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …

{RHINE}: Robust and High-performance Internet Naming with {E2E} Authenticity

H Duan, R Fischer, J Lou, S Liu, D Basin… - 20th USENIX Symposium …, 2023 - usenix.org
The variety and severity of recent DNS-based attacks under-score the importance of a
secure naming system. Although DNSSEC provides data authenticity in theory, practical …

SDBGPChain: A decentralized low complexity framework to detect and prevent the BGPattacks using SDN with smart contract based Dendrimer tree blockchain

TL Kayathri, N Kumaresan, R Vijayabhasker - Computer Networks, 2023 - Elsevier
Abstract The Border Gateway Protocol (BGP) helps to exchange the information over the
internet. However, BGP is susceptible to malicious attacks and misconfigurations meanwhile …

Armored Core of PKI: Remove Signing Keys for CA via Physically Unclonable Function

X Zhang, C Chen, K Qin, C Zhang, S Qu… - arXiv preprint arXiv …, 2024 - arxiv.org
The protection of CA's signing keys is one of the most crucial security concerns in PKI.
However, these keys can still be exposed today by human errors or various carefully …

A Public Key Infrastructure for 5G Service-Based Architecture

A Kumar, VLL Thing - … on Trust, Security and Privacy in …, 2023 - ieeexplore.ieee.org
The 3GPP 5G Service-based Architecture (SBA) security specifications leave several details
on how to setup an appropriate Public Key Infrastructure (PKI) for 5G SBA, unspecified. In …

Investigate and Improve the Certificate Revocation in Web PKI

C Zhang, C An, T Yu, Z Zheng… - NOMS 2024-2024 IEEE …, 2024 - ieeexplore.ieee.org
The validity and efficiency of certificate revocation in today's web Public Key Infrastructure
(PKI) are consistently overlooked. In this paper, we analyse current certificate revocation …

[PDF][PDF] Key Management

C Krähenbühl, A Perrig - Trends in Data Protection and Encryption …, 2023 - library.oapen.org
Key management describes how cryptographic keys are created, securely stored, distributed
to the respective key holders, and used in accordance with protocol specifications. It is thus …

[PDF][PDF] Student Number: 180240438

N Hitch - 2022 - royalholloway.ac.uk
This report is one of the required modules for the course MSc in Information Security at
Royal Holloway, University of London. This is a longitudinal study for the adoption of several …

[PDF][PDF] Zero-Trust Security Model Applied to Smart Shipping. Advances in Knowledge-Based Systems, Data Science, and Cybersecurity; Research. 2024; 1 (1): 5

M Bargh - cybersecurityjournal.info
Securing information systems and assets within smart shipping environments is of utmost
importance. In practice, however, securing smart shipping is a difficult and tedious task …