A survey of trust in internet applications

T Grandison, M Sloman - IEEE Communications Surveys & …, 2000 - ieeexplore.ieee.org
Trust is an important aspect of decision making for Internet applications and particularly
influences the specification of security policy, ie, who is authorized to perform actions as well …

Let's Encrypt: an automated certificate authority to encrypt the entire web

J Aas, R Barnes, B Case, Z Durumeric… - Proceedings of the …, 2019 - dl.acm.org
Let's Encrypt is a free, open, and automated HTTPS certificate authority (CA) created to
advance HTTPS adoption to the entire Web. Since its launch in late 2015, Let's Encrypt has …

[HTML][HTML] Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile

D Cooper, S Santesson, S Farrell, S Boeyen… - 2008 - rfc-editor.org
RFC 5280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List
(CRL) Profile [RFC Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Errata] [Info page] PROPOSED …

Multi-signatures in the plain public-key model and a general forking lemma

M Bellare, G Neven - Proceedings of the 13th ACM conference on …, 2006 - dl.acm.org
A multi-signature scheme enables a group of signers to produce a compact, joint signature
on a common document, and has many potential uses. However, existing schemes impose …

[图书][B] Information security management handbook

HF Tipton, M Krause - 2007 - taylorfrancis.com
Considered the gold-standard reference on information security, the Information Security
Management Handbook provides an authoritative compilation of the fundamental …

[图书][B] Vehicular networking

C Sommer, F Dressler - 2015 - books.google.com
With this essential guide to vehicular networking, you will learn about everything from
conceptual approaches and state-of-the-art protocols, to system designs and their …

[图书][B] Computer network time synchronization: the network time protocol

DL Mills - 2006 - taylorfrancis.com
What started with the sundial has, thus far, been refined to a level of precision based on
atomic resonance: Time. Our obsession with time is evident in this continued scaling down …

Secure proxy signature schemes for delegation of signing rights

A Boldyreva, A Palacio, B Warinschi - Journal of Cryptology, 2012 - Springer
A proxy signature scheme permits an entity to delegate its signing rights to another. These
schemes have been suggested for use in numerous applications, particularly in distributed …

PTAS: Privacy-preserving thin-client authentication scheme in blockchain-based PKI

W Jiang, H Li, G Xu, M Wen, G Dong, X Lin - Future Generation Computer …, 2019 - Elsevier
Recent years have witnessed tremendous academic efforts and industry growth in Internet of
Things (IoT). Security issues of IoT have become increasingly prominent. Public Key …

[HTML][HTML] PKI4IoT: Towards public key infrastructure for the Internet of Things

J Höglund, S Lindemer, M Furuhed, S Raza - Computers & Security, 2020 - Elsevier
Abstract Public Key Infrastructure is the state-of-the-art credential management solution on
the Internet. However, the millions of constrained devices that make of the Internet of Things …