Secure connections on the Internet are crucial to many ap-plications. Nowadays infrastructure for securing connections on the Internet heavily relies on the X.509 public-key infra-structure (PKI), which is maintained by Certificate Author-ities (CAs). Recent attacks on CAs showed the fragility of the current X.509 system. In order to alleviate or entirely fix problems with the X.509 system, different techniques and systems have been pro-posed. The proposed systems can be categorized into 4 dif-ferent concepts: DNS-based, Pinning-based, Notary-based, and Transparency-based approaches. This paper gives an overview over these concepts and outlines their advantages and disadvantages. It also covers some of the best-known representatives of the ...
AbstractThe Internet today is a highly dynamic environment which frequently requires secure communic...
The security of the Public Key Infrastructure has been reevaluated in response to Certification Auth...
This paper provides a review of the current state of the art in standards for Public Key Infrastruct...
Creating a secure connection on the Internet is made possible through the usage of certificates, bin...
The Web public-key infrastructure (PKI) provides a mechanism to identify websites to end users for t...
The use of insecure networks -such as the Internet- to send and receive information has made the nee...
A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propaga...
Information Systems have a need for a level of security to protect the data when being transmitted f...
The modern digital internet economy and billions of dollars of trade are made possible by the intern...
Public Key Infrastructure (PKI) has turned out to be useful when two parties negotiate about a share...
A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propaga...
This article deals with the deployment of a secure IT infrastructure on a company-wide basis. This m...
Security mechanisms can only be effective if they are usable as well. Above all, this statement appl...
In the current rocket-speed growing E-commerce market, certain infrastructure, which enables users t...
This research is a study of public key infrastructure (PKI) technologies, present and future. It mod...
AbstractThe Internet today is a highly dynamic environment which frequently requires secure communic...
The security of the Public Key Infrastructure has been reevaluated in response to Certification Auth...
This paper provides a review of the current state of the art in standards for Public Key Infrastruct...
Creating a secure connection on the Internet is made possible through the usage of certificates, bin...
The Web public-key infrastructure (PKI) provides a mechanism to identify websites to end users for t...
The use of insecure networks -such as the Internet- to send and receive information has made the nee...
A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propaga...
Information Systems have a need for a level of security to protect the data when being transmitted f...
The modern digital internet economy and billions of dollars of trade are made possible by the intern...
Public Key Infrastructure (PKI) has turned out to be useful when two parties negotiate about a share...
A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propaga...
This article deals with the deployment of a secure IT infrastructure on a company-wide basis. This m...
Security mechanisms can only be effective if they are usable as well. Above all, this statement appl...
In the current rocket-speed growing E-commerce market, certain infrastructure, which enables users t...
This research is a study of public key infrastructure (PKI) technologies, present and future. It mod...
AbstractThe Internet today is a highly dynamic environment which frequently requires secure communic...
The security of the Public Key Infrastructure has been reevaluated in response to Certification Auth...
This paper provides a review of the current state of the art in standards for Public Key Infrastruct...