A survey on X. 509 public-key infrastructure, certificate revocation, and their modern implementation on blockchain and ledger technologies

S Khan, F Luo, Z Zhang, F Ullah, F Amin… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Cyber-attacks are becoming more common against Internet users due to the increasing
dependency on online communication in their daily lives. X. 509 Public-Key Infrastructure …

A digital rights management system based on a scalable blockchain

A Garba, AD Dwivedi, M Kamal, G Srivastava… - Peer-to-Peer Networking …, 2021 - Springer
Even though the Internet promotes data sharing and transparency, however it does not
protect digital content. In today's digital world, it has become a difficult task to release a DRM …

Challenges in decentralized name management: the case of ENS

P Xia, H Wang, Z Yu, X Liu, X Luo, G Xu… - Proceedings of the 22nd …, 2022 - dl.acm.org
DNS has often been criticized for inherent design flaws, which make the system vulnerable
to attack. Further, domain names are not fully controlled by users, meaning that they can …

LightCERT4IoTs: Blockchain-based lightweight certificates authentication for IoT applications

A Garba, D Khoury, P Balian, S Haddad, J Sayah… - IEEE …, 2023 - ieeexplore.ieee.org
The proliferation of the internet of things (IoT) within the emergence of five-generation (5G)
networks has received a huge attention in both industrial and academic domains. A 5G …

LightLedger: a novel blockchain-based domain certificate authentication and validation scheme

A Garba, Z Chen, Z Guan… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Nowadays, existing public key infrastructures (PKIs) certificate authentication suffers from
many security failures. Trusted certificate authorities (CAs) can issue a valid certificate for …

Ethereum name service: the good, the bad, and the ugly

P Xia, H Wang, Z Yu, X Liu, X Luo, G Xu - arXiv preprint arXiv:2104.05185, 2021 - arxiv.org
DNS has always been criticized for its inherent design flaws, making the system vulnerable
to kinds of attacks. Besides, DNS domain names are not fully controlled by the users, which …

Performance Evaluation and Analysis of LightCert4IoT using Cooja-Contiki Simulator

D Khoury, S Haddad, P Sondi, G Abou Haidar… - IEEE …, 2024 - ieeexplore.ieee.org
Recently, the focus on the Internet of Things (IoT) has rocketed in parallel with the evolution
of mobile fifth-generation (5G) networks. To fully utilize IoT, which wirelessly connects …

Unravelling ariadne's thread: Exploring the threats of decentralised dns

C Patsakis, F Casino, N Lykousas, V Katos - IEEE Access, 2020 - ieeexplore.ieee.org
The current landscape of the core Internet technologies shows considerable centralisation
with the big tech companies controlling the vast majority of traffic and services. This situation …

BB-PKI: Blockchain-based public key infrastructure certificate management

A Garba, Q Hu, Z Chen… - 2020 IEEE 22nd …, 2020 - ieeexplore.ieee.org
Recently, real-world attacks against the web Public Key Infrastructure (PKI) have arisen
more frequently. The current PKI that use Registration Authorities/Certificate Authorities …

Unearthing malicious campaigns and actors from the blockchain DNS ecosystem

F Casino, N Lykousas, V Katos, C Patsakis - Computer Communications, 2021 - Elsevier
Blockchain DNS has emerged as an alternative solution to traditional DNS to address many
of its inherent drawbacks. In this regard, a blockchain DNS approach is decentralised …