Cyber-attacks are becoming more common against Internet users due to the increasing dependency on online communication in their daily lives. X. 509 Public-Key Infrastructure …
Named Data Networking (NDN) is one of five projects funded by the US National Science Foundation under its Future Internet Architecture Program. NDN has its roots in an earlier …
JL Tsai, NW Lo - IEEE transactions on smart grid, 2015 - ieeexplore.ieee.org
To fully support information management among various stakeholders in smart grid domains, how to establish secure communication sessions has become an important issue …
Thanks to the widespread deployment of TLS, users can access private data over channels with end-to-end confidentiality and integrity. What they cannot do, however, is prove to third …
There is considerable interest today in the use of blockchain technology to provide better visibility into shared information among a number of participants and systems arranged in a …
Due to their ubiquity in modern web browsers, anti-phishing blacklists are a key defense against large-scale phishing attacks. However, sophistication in phishing websites—such as …
Public-key infrastructure (PKI) provides the essential foundation for public-key cryptography, and security is often bootstrapped from a PKI. Standardization bodies, organizations …
Although there have been attempts to develop code transformations that yield tamper- resistant software, no reliable software-only methods are known. This paper studies the …
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security in …