<p>Recent trends in public-key infrastructure research explore the tradeoff between decreased trust in certificate authorities (CAs), the level of security achieved, the communication overhead (bandwidth and latency) for setting up a secure connection (e.g., verified via SSL/TLS), and the availability with respect to verifiability of public key information. In this paper, we propose TKI as a new public-key validation infrastructure, where we reduce the level of trust in any CA and increase the security by achieving increased robustness in the case of CA key compromise. Compared to other proposals, we reduce the communication overhead associated with certificate validation during the existing SSL/TLS connection handshake and provide site o...
After four decades of public key cryptography, both the industry and academia seek better solutions ...
Certificate Transparency provides auditability to the widely used X.509 Public Key Infrastructure (P...
Many of today’s web-based services rely heavily on secure end-to-end connections. The “trust” that t...
Recent trends in public-key infrastructure research explore the tradeoff between decreased trust in ...
Current Transport Layer Security (TLS) Public-Key Infrastructure (PKI) is a vast and complex system;...
International audienceThe security of public key validation protocols for web-based applications has...
open access journalA Public Key Infrastructure (PKI) is considered one of the most important techniq...
Creating a secure connection on the Internet is made possible through the usage of certificates, bin...
The current Transport Layer Security (TLS) Public-Key Infrastructure (PKI) is based on a weakest-lin...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
We identify end-user digital certificate management as a vulnerability in public key infrastructure ...
International audienceA Public Key Infrastructure (PKI) is considered one of the most important tech...
We present ARPKI, a public-key infrastructure that ensures that certificate-related operations, such...
Public-key infrastructures are increasingly being used as foundation for several security solutions,...
The current Transport Layer Security (TLS) Public-Key Infrastructure (PKI) is based on a weakest-lin...
After four decades of public key cryptography, both the industry and academia seek better solutions ...
Certificate Transparency provides auditability to the widely used X.509 Public Key Infrastructure (P...
Many of today’s web-based services rely heavily on secure end-to-end connections. The “trust” that t...
Recent trends in public-key infrastructure research explore the tradeoff between decreased trust in ...
Current Transport Layer Security (TLS) Public-Key Infrastructure (PKI) is a vast and complex system;...
International audienceThe security of public key validation protocols for web-based applications has...
open access journalA Public Key Infrastructure (PKI) is considered one of the most important techniq...
Creating a secure connection on the Internet is made possible through the usage of certificates, bin...
The current Transport Layer Security (TLS) Public-Key Infrastructure (PKI) is based on a weakest-lin...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
We identify end-user digital certificate management as a vulnerability in public key infrastructure ...
International audienceA Public Key Infrastructure (PKI) is considered one of the most important tech...
We present ARPKI, a public-key infrastructure that ensures that certificate-related operations, such...
Public-key infrastructures are increasingly being used as foundation for several security solutions,...
The current Transport Layer Security (TLS) Public-Key Infrastructure (PKI) is based on a weakest-lin...
After four decades of public key cryptography, both the industry and academia seek better solutions ...
Certificate Transparency provides auditability to the widely used X.509 Public Key Infrastructure (P...
Many of today’s web-based services rely heavily on secure end-to-end connections. The “trust” that t...