Traditional identity management (IdM) systems rely on third-party identity providers (IdPs) and are centralised, which can make them vulnerable to data breaches and other security …
AS Shehu - arXiv preprint arXiv:2409.03624, 2024 - arxiv.org
Identity Management Systems (IdMs) have complemented how users are identified, authenticated, and authorised on e-services. Among the methods used for this purpose are …
J Liang, M Sadiq, G Yang, D Cheng - Journal of Network and Computer …, 2023 - Elsevier
Abstract Vehicular Ad Hoc Networks (VANETs) are considered the technological upheaval for improving road safety and traffic efficiency by enabling the wireless and network …
The convergence of technologies is happening across various aspects, such as communication, computing, medicine, and transportation. The smartphone is a perfect …
One of the key operations in the Public Key Infrastructure (PKI) is certificate revocation management. In essence, revocation is a process to check the reliability of the certificate. A …
Credential revocation is a critical component of identity management. Credentials must be revoked on time to avoid legal issues, information misuse, and potential economic damage …
MR Sabramooz, K Zhang - 2024 6th International Conference …, 2024 - ieeexplore.ieee.org
Several approaches have been suggested for authenticating verifiable credentials, however, most fail to address the issue of revocation. Additionally, the suggested revocation technique …
Open banking allows banks and financial sectors to easily access the customers' financial data which is revolutionizing. It also provides the customers with excellent cloud access to …