This paper describes a new technology for fast, lightweight, and secure confirmation of information related to digital certificates. With the continued rapid expansion of Internet and wireless services, there is a growing need for enhanced public key infrastructure (PKI) services, including more efficient ways to confirm certificate revocation status and related entitlements. In a wireless environment, (a) messages must be small, due to low baud rates, and (b) the computation to verify them must be minimal, due to the reduced computing resources in many hand held devices. The blocked hash tree (BHT) technology uses a Merkle tree (M-tree) to encode a table of attribute values, with the M-tree’s root then embedded in a certificate extension. ...
The fake certificate is a special global problem in today's digital age. Thousands of universities a...
The 2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7-11 June 2020Inter...
Due to the advent developments in the Information and Communication Technology (ICT) based environme...
Public-key cryptography is widely used to provide Internet security services. The public-key infrast...
No doubt that data security online is crucial. Therefore, great attention has been paid to that aspe...
Certificate revocation is a challenging task, especiallyin mobile network environments such as vehic...
We address the challenging problem of efficient trust establishment in constrained networks, i.e., n...
Certificate revocation is a challenging task, especiallyin mobile network environments such as vehic...
High security network transactions require the checking of the revocation status of public key certi...
Verification of the certificate revocation status is a crucial process for Public Key Infrastructure...
Abstract – Security is major issues in today’s world. Everything in today’s world should be done sec...
Vehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehic...
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, lik...
none2The paper presents a new on-line method for efficient authentication and verification of certif...
Security is vital for the reliable operation of vehicular ad hoc networks (VANETs). One of the criti...
The fake certificate is a special global problem in today's digital age. Thousands of universities a...
The 2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7-11 June 2020Inter...
Due to the advent developments in the Information and Communication Technology (ICT) based environme...
Public-key cryptography is widely used to provide Internet security services. The public-key infrast...
No doubt that data security online is crucial. Therefore, great attention has been paid to that aspe...
Certificate revocation is a challenging task, especiallyin mobile network environments such as vehic...
We address the challenging problem of efficient trust establishment in constrained networks, i.e., n...
Certificate revocation is a challenging task, especiallyin mobile network environments such as vehic...
High security network transactions require the checking of the revocation status of public key certi...
Verification of the certificate revocation status is a crucial process for Public Key Infrastructure...
Abstract – Security is major issues in today’s world. Everything in today’s world should be done sec...
Vehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehic...
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, lik...
none2The paper presents a new on-line method for efficient authentication and verification of certif...
Security is vital for the reliable operation of vehicular ad hoc networks (VANETs). One of the criti...
The fake certificate is a special global problem in today's digital age. Thousands of universities a...
The 2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7-11 June 2020Inter...
Due to the advent developments in the Information and Communication Technology (ICT) based environme...