Cyber-attacks are becoming more common against Internet users due to the increasing dependency on online communication in their daily lives. X. 509 Public-Key Infrastructure …
Named Data Networking (NDN) is one of five projects funded by the US National Science Foundation under its Future Internet Architecture Program. NDN has its roots in an earlier …
On August 28, 2011, a mis-issued wildcard HTTPS certificate for google. com was used to conduct a man-in-the-middle attack against multiple users in Iran. The certificate had been …
JL Tsai, NW Lo - IEEE transactions on smart grid, 2015 - ieeexplore.ieee.org
To fully support information management among various stakeholders in smart grid domains, how to establish secure communication sessions has become an important issue …
Thanks to the widespread deployment of TLS, users can access private data over channels with end-to-end confidentiality and integrity. What they cannot do, however, is prove to third …
There is considerable interest today in the use of blockchain technology to provide better visibility into shared information among a number of participants and systems arranged in a …
Due to their ubiquity in modern web browsers, anti-phishing blacklists are a key defense against large-scale phishing attacks. However, sophistication in phishing websites—such as …
Public-key infrastructure (PKI) provides the essential foundation for public-key cryptography, and security is often bootstrapped from a PKI. Standardization bodies, organizations …