Web services: problems and future directions

H Wang, JZ Huang, Y Qu, J Xie - Journal of Web Semantics, 2004 - Elsevier
Recently, Web services have generated great interests in both vendors and researchers.
Web services, based on existing Internet protocols and open standards, can provide a …

[PDF][PDF] Guidelines for the selection, configuration, and use of transport layer security (TLS) implementations

K McKay, D Cooper - 2017 - csrc.nist.gov
This publication has been developed by NIST in accordance with its statutory
responsibilities under the 50 Federal Information Security Modernization Act (FISMA) of …

[HTML][HTML] Public key infrastructure: A survey

A Albarqi, E Alzaid, F Al Ghamdi, S Asiri… - Journal of Information …, 2014 - scirp.org
As security is essential in communications through electronic networks, development of
structures providing high levels of security is needed. Public Key Infrastructure (PKI) is a way …

A survey of PKI components and scalability issues

A Slagell, R Bonilla, W Yurcik - 2006 IEEE International …, 2006 - ieeexplore.ieee.org
In this paper, PKI implementations, namely PKTX, SPKT and PGR are discussed. In all of
these systems, there is a need to perform both efficient enrollment and revocation. We …

Multicast receiver and sender access control and its applicability to mobile IP environments: A survey

M Kellil, I Romdhani, HY Lach… - IEEE …, 2005 - napier-repository.worktribe.com
Multicast receiver and sender access control and its applicability to mobile IP environments: a
survey Skip to main content Edinburgh Napier Research Repository Home Research Outputs …

Design and implementation analysis of a public key infrastructure‐enabled security framework for ZigBee sensor networks

S Misra, S Goswami, C Taneja… - International Journal of …, 2016 - Wiley Online Library
ZigBee is a wireless network technology suitable for applications requiring lower bandwidth,
low energy consumption and small packet size. Security has been one of the challenges in …

Learned templates for feature extraction in fingerprint images

B Bhanu, X Tan - Proceedings of the 2001 IEEE Computer …, 2001 - ieeexplore.ieee.org
Most current techniques for minutiae extraction in fingerprint images utilize complex
preprocessing and postprocessing. In this paper, we propose a new technique, based on …

Multi-domain Public key infrastructure for Vehicle-to-Grid network

B Vaidya, D Makrakis… - MILCOM 2015-2015 IEEE …, 2015 - ieeexplore.ieee.org
Smart grid is a modern electrical grid that utilizes Information and Communication
Technologies (ICT) and information networks. Growing attraction in Electric Vehicles (EV) …

PKI security in large-scale healthcare networks

G Mantas, D Lymberopoulos, N Komninos - Journal of medical systems, 2012 - Springer
During the past few years a lot of PKI (Public Key Infrastructures) infrastructures have been
proposed for healthcare networks in order to ensure secure communication services and …

A layered IT infrastructure for secure interoperability in Personal Data Registry digital government services

F Arcieri, F Fioravanti, E Nardelli… - … Research Issues on …, 2004 - ieeexplore.ieee.org
In this paper we describe the architectural solution defined and implemented to ensure
secure interoperability among information technology (IT) systems managing personal data …