none2The paper presents a new on-line method for efficient authentication and verification of certificate status within Public-Key Infrastructures (PKIs). The method, based on a purposely conceived extension of the One-Way Accumulator (OWA) cryptographic primitive, permits to provide an explicit, concise, authenticated and not forgeable proof about the revocation status of each certificate. A thorough investigation on the performance attainable under different operating conditions shows that the devised method exhibits the same positive features of the well-known On-line Certificate Status Protocol (OCSP) as regards scalability, security and timeliness. Moreover, its peculiar characteristic of authenticating certificates status via a collec...
The demo is a proof of concept of an entity authentication solution defined in [1] that permits node...
Recent attacks and publications have shown the vulnerability of hierarchical Public Key Infrastructu...
Security mechanisms can only be effective if they are usable as well. Above all, this statement appl...
The paper presents a new on-line method for efficient authentication and verification of certificate...
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, lik...
A PKI (public key infrastructure) provides for a digital certificate that can identify an individual...
Abstract. The Public Key Infrastructure (PKI) technology is very im-portant to support secure global...
No doubt that data security online is crucial. Therefore, great attention has been paid to that aspe...
Certificate validation, one of the most important and complex tasks in a Public Key Infrastructure (...
Aiming at the problems of the WPKI certificate verification schemes based on online certificate stat...
Verification of the certificate revocation status is a crucial process for Public Key Infrastructure...
Public administrations show a strong interest in digital signature technology as a mean for secure a...
After four decades of public key cryptography, both the industry and academia seek better solutions ...
Current Transport Layer Security (TLS) Public-Key Infrastructure (PKI) is a vast and complex system;...
Public key infrastructures (PKIs) are of crucial importance for the life of online services relying ...
The demo is a proof of concept of an entity authentication solution defined in [1] that permits node...
Recent attacks and publications have shown the vulnerability of hierarchical Public Key Infrastructu...
Security mechanisms can only be effective if they are usable as well. Above all, this statement appl...
The paper presents a new on-line method for efficient authentication and verification of certificate...
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, lik...
A PKI (public key infrastructure) provides for a digital certificate that can identify an individual...
Abstract. The Public Key Infrastructure (PKI) technology is very im-portant to support secure global...
No doubt that data security online is crucial. Therefore, great attention has been paid to that aspe...
Certificate validation, one of the most important and complex tasks in a Public Key Infrastructure (...
Aiming at the problems of the WPKI certificate verification schemes based on online certificate stat...
Verification of the certificate revocation status is a crucial process for Public Key Infrastructure...
Public administrations show a strong interest in digital signature technology as a mean for secure a...
After four decades of public key cryptography, both the industry and academia seek better solutions ...
Current Transport Layer Security (TLS) Public-Key Infrastructure (PKI) is a vast and complex system;...
Public key infrastructures (PKIs) are of crucial importance for the life of online services relying ...
The demo is a proof of concept of an entity authentication solution defined in [1] that permits node...
Recent attacks and publications have shown the vulnerability of hierarchical Public Key Infrastructu...
Security mechanisms can only be effective if they are usable as well. Above all, this statement appl...