Certificate-based authentication of parties provides a powerful means for verifying claimed identities, since communicating partners do not have to exchange secrets in advance for authentication. This is especially valuable for roaming scenarios in mobile communications. When dealing with certificates, one must cope with the verification of complete certificate paths for security reasons. In mobile communications, there exist special conditions for this verification work. Mobile devices may have limited capacity for computation and mobile communication links may have limited bandwidth. In this paper, we propose to apply PKI servers -such as implemented at FhG-SIT- that allow the delegation of certificate path validation in order to speed up...
In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authen...
Abstract — In this work, we analyze and extend a recently proposed design of digital certificates ca...
The paper presents a new on-line method for efficient authentication and verification of certificate...
Abstract. Certificate-based authentication of parties provides a power-ful means for verifying claim...
Certificate-based authentication of parties provides a powerful means for verifying claimed identiti...
Authentication and authorisation architectures based on certificates have not been widely accepted d...
The problem of protecting mobile code from malicious hosts is an important security issue, for which...
We have developed a public key certificate validation system considering the restrictions peculiar t...
Abstract: With the rapid growth of the wireless Internet service, the interest in security technolog...
corresponding author Abstract. An optimized certificate-based protocol for mobile network with authe...
Since the early 1990s public-key certificate issuance has involved verifying users' identities and p...
Public-key infrastructures are increasingly being used as foundation for several security solutions,...
Dynamism of mobile ad-hoc networks implies changing trust relationships among their nodes that can b...
Network and device heterogeneity, nomadic mobility, intermittent connectivity and, more generally, e...
This paper includes developing framework for proxy based certificate Authority for MANET. Key manage...
In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authen...
Abstract — In this work, we analyze and extend a recently proposed design of digital certificates ca...
The paper presents a new on-line method for efficient authentication and verification of certificate...
Abstract. Certificate-based authentication of parties provides a power-ful means for verifying claim...
Certificate-based authentication of parties provides a powerful means for verifying claimed identiti...
Authentication and authorisation architectures based on certificates have not been widely accepted d...
The problem of protecting mobile code from malicious hosts is an important security issue, for which...
We have developed a public key certificate validation system considering the restrictions peculiar t...
Abstract: With the rapid growth of the wireless Internet service, the interest in security technolog...
corresponding author Abstract. An optimized certificate-based protocol for mobile network with authe...
Since the early 1990s public-key certificate issuance has involved verifying users' identities and p...
Public-key infrastructures are increasingly being used as foundation for several security solutions,...
Dynamism of mobile ad-hoc networks implies changing trust relationships among their nodes that can b...
Network and device heterogeneity, nomadic mobility, intermittent connectivity and, more generally, e...
This paper includes developing framework for proxy based certificate Authority for MANET. Key manage...
In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authen...
Abstract — In this work, we analyze and extend a recently proposed design of digital certificates ca...
The paper presents a new on-line method for efficient authentication and verification of certificate...