Part 2: Full PapersInternational audiencePublic Key Infrastructure is a key infrastructure for secure and trusted communication on the Internet. This paper revisits the problem of providing timely certificate revocation focusing on the needs of mobile devices. We survey existing schemes then present a new approach where the principal’s server functions as the directory for its own revocation information. We evaluate the properties and trust requirements in this approach, and propose two new schemes, CREV-I and CREV-II, which meet the security requirements and performance goals. Evaluation of CREV shows it is more lightweight on the verifier and more scalable at the CA and the principals while providing near real-time revocation
In spite of progress in securing Vehicular Communication (VC) systems, there is no consensus on how ...
In spite of progress in securing Vehicular Communication (VC) systems, there is no consensus on how ...
Public-key infrastructure (PKI) is based on public-key certificates and is the most widely used mech...
A fundamental problem inhibiting the wide acceptance of a Public Key Infrastructure (PKI) in the Int...
Abstract: We present a new certificate revocation system for both on-line and off-line use, which is...
Abstract—In this paper, we propose a lightweight mechanism for revoking security certificates that i...
In this paper, we propose a lightweight mechanism for revoking se-curity certificates appropriate fo...
Certificate revocation is a crucial integral element to secure network communications. During this p...
The ability to revoke certificates is a fundamental feature of a public key infrastructure. However,...
Public key infrastructure has been proposed as a promising foundation for verifying the authenticity...
Public key infrastructure has been proposed as a promising foundation for verifying the authenticity...
The need to evict compromised, faulty, or illegitimate nodes is well understood in prominent project...
The Public Key Infrastructure (PKI) is a public key infrastructure whose objective is to meet needs ...
10.1007/978-3-642-22200-9_15IFIP Advances in Information and Communication Technology358 AICT173-18
High security network transactions require the checking of the revocation status of public key certi...
In spite of progress in securing Vehicular Communication (VC) systems, there is no consensus on how ...
In spite of progress in securing Vehicular Communication (VC) systems, there is no consensus on how ...
Public-key infrastructure (PKI) is based on public-key certificates and is the most widely used mech...
A fundamental problem inhibiting the wide acceptance of a Public Key Infrastructure (PKI) in the Int...
Abstract: We present a new certificate revocation system for both on-line and off-line use, which is...
Abstract—In this paper, we propose a lightweight mechanism for revoking security certificates that i...
In this paper, we propose a lightweight mechanism for revoking se-curity certificates appropriate fo...
Certificate revocation is a crucial integral element to secure network communications. During this p...
The ability to revoke certificates is a fundamental feature of a public key infrastructure. However,...
Public key infrastructure has been proposed as a promising foundation for verifying the authenticity...
Public key infrastructure has been proposed as a promising foundation for verifying the authenticity...
The need to evict compromised, faulty, or illegitimate nodes is well understood in prominent project...
The Public Key Infrastructure (PKI) is a public key infrastructure whose objective is to meet needs ...
10.1007/978-3-642-22200-9_15IFIP Advances in Information and Communication Technology358 AICT173-18
High security network transactions require the checking of the revocation status of public key certi...
In spite of progress in securing Vehicular Communication (VC) systems, there is no consensus on how ...
In spite of progress in securing Vehicular Communication (VC) systems, there is no consensus on how ...
Public-key infrastructure (PKI) is based on public-key certificates and is the most widely used mech...