• Corpus ID: 10611996

Public Key Infrastructure Overview

@inproceedings{WeiseSunps2001PublicKI,
  title={Public Key Infrastructure Overview},
  author={Joel Weise-Sunps},
  year={2001}
}

Figures from this paper

A Distributed Public Key Infrastructure for the IoT
TLDR
This thesis presents DEcentralized Key INfrastructure (DECKIN), which addresses scalability, key management for recovery and revocation and verification of the identity that is being registered in a fully decentralized context by building an infrastructure on top of blockchain technology.
Public key cryptography: Feasible for security in modern personal area sensor networks?
TLDR
This work creates a public key library suite based in selected approached from IEEE 1363 to test two of new devices and confirm the capabilities of these new devices.
Architecture for security and trust in digital environments (SecuTIDE)
....................................................................................................................... XIV Author’s Publications
An ECC based public key infrastructure usable for mobile applications
TLDR
A Mobile Home Agent (MHA) and Registration Authority (RA) that minimize the major work/processing loads of mobile phone and Certificate Authority (CA), respectively and the use of ECC reduces the computation cost, message size and transmission overhead over RSA significantly.
A distributed mechanism for secure collaboration in digital ecosystems
TLDR
This paper proposes a distributed mechanism for enterprises to manage their authentication and authorization processes with an aim to provide a rigorous protection of entities' resources.
Fog - Applying blockchain to secure a distributed set of clusters
TLDR
The main objective of this project is the proposal of a novel blockchain architecture that will contain all the Fog session information that will provide security to the Fog devices, and it will be capable of providing authentication and verification mechanisms to those devices, ensuring the integrity of the data provided.
Efficient Onboarding and Management of Members in Permissioned Blockchain Networks Utilizing TLS Certificates
TLDR
This paper proposes a novel methodology to allow the onboarding of new parties without time-intensive off-chain processes, and establishes identities of new consortia members by utilizing TLS certificates bound to publicly known domain names.
BankID-based Authentication for Phone Calls
TLDR
The results showed that BankID can be used for authentication during phone calls, improving security while still being easy to use.
Decentralized data access control over consortium blockchains
TLDR
It is shown from a trust model for consortium collaborative networks that current consortium blockchain systems provide limited support for decentralized data access control (DDAC), and a general framework is proposed to help inexperienced users determine appropriate strategies under different application scenarios.
...
1
2
3
4
5
...

References

SHOWING 1-7 OF 7 REFERENCES
Bridge certification authorities: connecting B2B public key infrastructure with PAK and zero-knowledge proof
TLDR
A Password Authentication Protocol (PAK), which provides means to authenticate or validate users across Bridge Certification Authorities (BCA), where certificates authorities (CA) are limited and cannot reach over to the other side of the BCA.
NIST PKI Project Team, Certificate Issuing and Management Components Protection Profile
  • NIST PKI Project Team, Certificate Issuing and Management Components Protection Profile
  • 2001
Certificate Policy and Certification Practices Framework
< draft-ietf-pkix-ipki-new-rfc2527-00.txt > Status of this Memo This document is an Internet-Draft and is subject to all provisions of Section 10 of RFC2026. Internet-Drafts are working documents of
Understanding Public-key Infrastructure
  • Understanding Public-key Infrastructure
  • 1999
Handbook of Applied Cryptography
From the Publisher: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of
Bruce Schneier, Applied Cryptography
  • Bruce Schneier, Applied Cryptography
  • 1995