Security for internet of things: A state of the art on existing protocols and open research issues

C Mahmoud, S Aouag - Proceedings of the 9th international conference …, 2019 - dl.acm.org
Internet of Things (IoT) consists of devices, smart objects, and people that are given a
unique identifier connected to the internet via wireless network. These devices are usually …

A survey on X. 509 public-key infrastructure, certificate revocation, and their modern implementation on blockchain and ledger technologies

S Khan, F Luo, Z Zhang, F Ullah, F Amin… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Cyber-attacks are becoming more common against Internet users due to the increasing
dependency on online communication in their daily lives. X. 509 Public-Key Infrastructure …

Named data networking

L Zhang, A Afanasyev, J Burke, V Jacobson… - ACM SIGCOMM …, 2014 - dl.acm.org
Named Data Networking (NDN) is one of five projects funded by the US National Science
Foundation under its Future Internet Architecture Program. NDN has its roots in an earlier …

Certificate transparency: Public, verifiable, append-only logs

B Laurie - Queue, 2014 - dl.acm.org
On August 28, 2011, a mis-issued wildcard HTTPS certificate for google. com was used to
conduct a man-in-the-middle attack against multiple users in Iran. The certificate had been …

Secure anonymous key distribution scheme for smart grid

JL Tsai, NW Lo - IEEE transactions on smart grid, 2015 - ieeexplore.ieee.org
To fully support information management among various stakeholders in smart grid
domains, how to establish secure communication sessions has become an important issue …

[HTML][HTML] Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile

D Cooper, S Santesson, S Farrell, S Boeyen… - 2008 - rfc-editor.org
RFC 5280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List
(CRL) Profile [RFC Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Errata] [Info page] PROPOSED …

Deco: Liberating web data using decentralized oracles for tls

F Zhang, D Maram, H Malvai, S Goldfeder… - Proceedings of the 2020 …, 2020 - dl.acm.org
Thanks to the widespread deployment of TLS, users can access private data over channels
with end-to-end confidentiality and integrity. What they cannot do, however, is prove to third …

Toward an interoperability architecture for blockchain autonomous systems

T Hardjono, A Lipton, A Pentland - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
There is considerable interest today in the use of blockchain technology to provide better
visibility into shared information among a number of participants and systems arranged in a …

{PhishTime}: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists

A Oest, Y Safaei, P Zhang, B Wardman… - 29th USENIX Security …, 2020 - usenix.org
Due to their ubiquity in modern web browsers, anti-phishing blacklists are a key defense
against large-scale phishing attacks. However, sophistication in phishing websites—such as …

Survey on issues and recent advances in vehicular public-key infrastructure (VPKI)

S Khan, F Luo, Z Zhang, MA Rahim… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Public-key infrastructure (PKI) provides the essential foundation for public-key cryptography,
and security is often bootstrapped from a PKI. Standardization bodies, organizations …