Certificate management is a crucial element in PKI implementations, which includes certificate generation, distribution, storage, and revocation. Most of the existing research has been focusing on the security aspect or the functionality and the structure of certificate management systems. Very little has looked at the actual user requirements for the system and how users can use the system conveniently and practically, which is actually a very important factor for the whole security system to work properly and to be widely accepted. In this thesis we have designed a framework that provides a flexible certificate management for different security levels according to user requirements and situations, and with a user-friendly interface. A cer...
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, lik...
Creating a secure connection on the Internet is made possible through the usage of certificates, bin...
The paper presents a new on-line method for efficient authentication and verification of certificate...
A public key infrastructure (PKI) secures lots of applications and processes. These are for example ...
Public key certificates (PKCs) are used nowadays in several security protocols and applications, so ...
A PKI (public key infrastructure) provides for a digital certificate that can identify an individual...
PKI deployment and use has not met its expectations. One reason that PKIX has not been fully accepte...
Public-key infrastructures are increasingly being used as foundation for several security solutions,...
Security mechanisms can only be effective if they are usable as well. Above all, this statement appl...
Web software that is designed and deployed to collect end-user information and transmit it to a remo...
This paper describes a flexible and general purpose PKI platform providing an easily interoperable s...
This article deals with the deployment of a secure IT infrastructure on a company-wide basis. This m...
Public administrations show a strong interest in digital signature technology as a mean for secure a...
Context. An SSL encrypted client-server communication is necessary to maintain the security and priv...
Web software that is designed and deployed to collect end-user information and transmit it to a remo...
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, lik...
Creating a secure connection on the Internet is made possible through the usage of certificates, bin...
The paper presents a new on-line method for efficient authentication and verification of certificate...
A public key infrastructure (PKI) secures lots of applications and processes. These are for example ...
Public key certificates (PKCs) are used nowadays in several security protocols and applications, so ...
A PKI (public key infrastructure) provides for a digital certificate that can identify an individual...
PKI deployment and use has not met its expectations. One reason that PKIX has not been fully accepte...
Public-key infrastructures are increasingly being used as foundation for several security solutions,...
Security mechanisms can only be effective if they are usable as well. Above all, this statement appl...
Web software that is designed and deployed to collect end-user information and transmit it to a remo...
This paper describes a flexible and general purpose PKI platform providing an easily interoperable s...
This article deals with the deployment of a secure IT infrastructure on a company-wide basis. This m...
Public administrations show a strong interest in digital signature technology as a mean for secure a...
Context. An SSL encrypted client-server communication is necessary to maintain the security and priv...
Web software that is designed and deployed to collect end-user information and transmit it to a remo...
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, lik...
Creating a secure connection on the Internet is made possible through the usage of certificates, bin...
The paper presents a new on-line method for efficient authentication and verification of certificate...