A survey on X. 509 public-key infrastructure, certificate revocation, and their modern implementation on blockchain and ledger technologies

S Khan, F Luo, Z Zhang, F Ullah, F Amin… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Cyber-attacks are becoming more common against Internet users due to the increasing
dependency on online communication in their daily lives. X. 509 Public-Key Infrastructure …

[HTML][HTML] Achieving cybersecurity in blockchain-based systems: A survey

M Gimenez-Aguilar, JM De Fuentes… - Future Generation …, 2021 - Elsevier
With the increase in connectivity, the popularization of cloud services, and the rise of the
Internet of Things (IoT), decentralized approaches for trust management are gaining …

Blockchain based access control systems: State of the art and challenges

S Rouhani, R Deters - IEEE/WIC/ACM International Conference on Web …, 2019 - dl.acm.org
Access control is a mechanism in computer security that regulates access to the system
resources. The current access control systems face many problems, such as the presence of …

Dynamic group-oriented provable data possession in the cloud

K He, J Chen, Q Yuan, S Ji, D He… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As an important security property of cloud storage, data integrity has not been sufficiently
studied under the multi-writer model, where a group of users work on shared files …

Cross-certification towards distributed authentication infrastructure: A case of hyperledger fabric

S Kakei, Y Shiraishi, M Mohri, T Nakamura… - IEEE …, 2020 - ieeexplore.ieee.org
In Internet of Things ecosystems, where various entities trade data and data analysis results,
public key infrastructure plays an important role in establishing trust relationships between …

A survey of security threats and defense on Blockchain

J Cheng, L Xie, X Tang, N Xiong, B Liu - Multimedia Tools and …, 2021 - Springer
Blockchain provides a trusted environment for storing information and propagating
transactions. Owing to the distributed property and integrity, blockchain has been employed …

DKSM: A Decentralized Kerberos Secure Service-Management Protocol for Internet of Things

J Chen, H Xiao, Y Zheng, MM Hassan, M Ianni… - Internet of Things, 2023 - Elsevier
Kerberos is a widely used authentication protocol that protects distributed services on the
Internet of Things (IoT) and big data. In a distributed scenario, entities must prove their …

Taekwondo sports test and training data management using blockchain

U Rahardja, M Hardini, AL Al Nasir… - 2020 fifth international …, 2020 - ieeexplore.ieee.org
Data management and distributed transactions are characteristics of the Blockchain.
Although the Blockchain has initially been a technology used for bitcoin, the Blockchain has …

BB-PKI: Blockchain-based public key infrastructure certificate management

A Garba, Q Hu, Z Chen… - 2020 IEEE 22nd …, 2020 - ieeexplore.ieee.org
Recently, real-world attacks against the web Public Key Infrastructure (PKI) have arisen
more frequently. The current PKI that use Registration Authorities/Certificate Authorities …

PROCESS: Privacy-preserving on-chain certificate status service

M Jia, K He, J Chen, R Du, W Chen… - IEEE INFOCOM 2021 …, 2021 - ieeexplore.ieee.org
Clients (eg, browsers) and servers require public key certificates to establish secure
connections. When a client accesses a server, it needs to check the signature, expiration …