Security for internet of things: A state of the art on existing protocols and open research issues

C Mahmoud, S Aouag - Proceedings of the 9th international conference …, 2019 - dl.acm.org
Internet of Things (IoT) consists of devices, smart objects, and people that are given a
unique identifier connected to the internet via wireless network. These devices are usually …

A survey on X. 509 public-key infrastructure, certificate revocation, and their modern implementation on blockchain and ledger technologies

S Khan, F Luo, Z Zhang, F Ullah, F Amin… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Cyber-attacks are becoming more common against Internet users due to the increasing
dependency on online communication in their daily lives. X. 509 Public-Key Infrastructure …

Named data networking

L Zhang, A Afanasyev, J Burke, V Jacobson… - ACM SIGCOMM …, 2014 - dl.acm.org
Named Data Networking (NDN) is one of five projects funded by the US National Science
Foundation under its Future Internet Architecture Program. NDN has its roots in an earlier …

Secure anonymous key distribution scheme for smart grid

JL Tsai, NW Lo - IEEE transactions on smart grid, 2015 - ieeexplore.ieee.org
To fully support information management among various stakeholders in smart grid
domains, how to establish secure communication sessions has become an important issue …

Deco: Liberating web data using decentralized oracles for tls

F Zhang, D Maram, H Malvai, S Goldfeder… - Proceedings of the 2020 …, 2020 - dl.acm.org
Thanks to the widespread deployment of TLS, users can access private data over channels
with end-to-end confidentiality and integrity. What they cannot do, however, is prove to third …

Toward an interoperability architecture for blockchain autonomous systems

T Hardjono, A Lipton, A Pentland - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
There is considerable interest today in the use of blockchain technology to provide better
visibility into shared information among a number of participants and systems arranged in a …

{PhishTime}: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists

A Oest, Y Safaei, P Zhang, B Wardman… - 29th USENIX Security …, 2020 - usenix.org
Due to their ubiquity in modern web browsers, anti-phishing blacklists are a key defense
against large-scale phishing attacks. However, sophistication in phishing websites—such as …

Survey on issues and recent advances in vehicular public-key infrastructure (VPKI)

S Khan, F Luo, Z Zhang, MA Rahim… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Public-key infrastructure (PKI) provides the essential foundation for public-key cryptography,
and security is often bootstrapped from a PKI. Standardization bodies, organizations …

Architectural support for copy and tamper resistant software

D Lie, C Thekkath, M Mitchell, P Lincoln, D Boneh… - Acm Sigplan …, 2000 - dl.acm.org
Although there have been attempts to develop code transformations that yield tamper-
resistant software, no reliable software-only methods are known. This paper studies the …

Secure attribute-based systems

M Pirretti, P Traynor, P McDaniel, B Waters - Proceedings of the 13th …, 2006 - dl.acm.org
Attributes define, classify, or annotate the datum to which they are assigned. However,
traditional attribute architectures and cryptosystems are ill-equipped to provide security in …