Abstract: We present a new certificate revocation system for both on-line and off-line use, which is targeted to mobile-commerce systems. It allows to use certificates from any certificate issuer and to apply a proprietary revocation strategy. Our approach is well suited especially for location-aware services and mobile devices, because 1) our protocol reduces the amount of online communication, 2) the revocation tree is structured in such a way that certificates of services, which are located in the same region, can be verified using the same revocation proof.
Advanced Metering Infrastructure forms a communication network for the collection of power data from...
Public-key cryptography is widely used to provide Internet security services. The public-key infrast...
A new certificate revocation system is presented. The basic idea is to divide the certificate space ...
Part 2: Full PapersInternational audiencePublic Key Infrastructure is a key infrastructure for secur...
In this paper, we propose a lightweight mechanism for revoking se-curity certificates appropriate fo...
Abstract – Security is major issues in today’s world. Everything in today’s world should be done sec...
Abstract—In this paper, we propose a lightweight mechanism for revoking security certificates that i...
Certificate revocation is a crucial integral element to secure network communications. During this p...
Certificate revocation is a challenging task, especially in mobile network environments. Several dif...
Among civilian communication systems, vehicular networks emerge as one of the most convincing and ye...
High security network transactions require the checking of the revocation status of public key certi...
10.1109/Metrisec.2011.17Proceedings - 2011 3rd International Workshop on Security Measurements and M...
Abstract – Mobile ad-hoc networks are self-organizing and self configurable with an open network env...
Digital certificates signed by trusted certification authorities (CAs) are used for multiple purpos...
The need to evict compromised, faulty, or illegitimate nodes is well understood in prominent project...
Advanced Metering Infrastructure forms a communication network for the collection of power data from...
Public-key cryptography is widely used to provide Internet security services. The public-key infrast...
A new certificate revocation system is presented. The basic idea is to divide the certificate space ...
Part 2: Full PapersInternational audiencePublic Key Infrastructure is a key infrastructure for secur...
In this paper, we propose a lightweight mechanism for revoking se-curity certificates appropriate fo...
Abstract – Security is major issues in today’s world. Everything in today’s world should be done sec...
Abstract—In this paper, we propose a lightweight mechanism for revoking security certificates that i...
Certificate revocation is a crucial integral element to secure network communications. During this p...
Certificate revocation is a challenging task, especially in mobile network environments. Several dif...
Among civilian communication systems, vehicular networks emerge as one of the most convincing and ye...
High security network transactions require the checking of the revocation status of public key certi...
10.1109/Metrisec.2011.17Proceedings - 2011 3rd International Workshop on Security Measurements and M...
Abstract – Mobile ad-hoc networks are self-organizing and self configurable with an open network env...
Digital certificates signed by trusted certification authorities (CAs) are used for multiple purpos...
The need to evict compromised, faulty, or illegitimate nodes is well understood in prominent project...
Advanced Metering Infrastructure forms a communication network for the collection of power data from...
Public-key cryptography is widely used to provide Internet security services. The public-key infrast...
A new certificate revocation system is presented. The basic idea is to divide the certificate space ...