Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
PKI Trust Models
biblio
On the Practicality of a Smart Contract PKI
Submitted by aekwall on Mon, 04/06/2020 - 10:16am
Distributed Applications
smart contract
PKI Trust Models
Additives
communication security
accumulator
blockchain-based identity systems store
centralized authorities
constant-sized state
constant-sized storage
contracts
identity records verification
live chain
main building blocks
provably secure contract
public key infrastructures
securing communications
smart contract PKI
smart contract platform
blockchain
telecommunication security
system monitoring
Resiliency
Human behavior
pubcrawl
privacy
Cryptography
Metrics
Scalability
internet
smart contracts
ethereum
public key cryptography
computational complexity
Formal Specification
software fault tolerance
Security Properties
biblio
Trust Enhancement Scheme for Cross Domain Authentication of PKI System
Submitted by aekwall on Mon, 04/06/2020 - 10:16am
multiple PKI systems
unified trust service problem
Trusted Computing
trust enhancement scheme
Trust delivery
traditional trusted third party
Scalability
Resiliency
public key infrastructure
public key cryptography
pubcrawl
PKI Trust Models
PKI management domains
PKI (Public Key Infrastructure)
authentication
Metrics
Human behavior
e-government applications
E-Government
Distributed databases
cross-domain authentication
cross-domain
CRL
certificate revocation list
blockchain consensus
blockchain
authorisation
biblio
RDI: Real Digital Identity Based on Decentralized PKI
Submitted by aekwall on Mon, 11/18/2019 - 11:49am
Brute-force Attack
PKI Trust Models
username-password approach
trusted source certificate authorities
Real Digital Identity based approach
RDI
public key binding
public key approach
point of trust attack
online transactions
Online banking
Internet banking applications
Digital identity
decentralized PKI scheme
decentralized PKI
automobiles
Registers
public key cryptography
Public key
smart contracts
message authentication
smart contract
blockchain
Metrics
pubcrawl
Human behavior
Resiliency
authorisation
Scalability
biblio
TRUFL: Distributed Trust Management Framework in SDN
Submitted by aekwall on Mon, 11/18/2019 - 11:49am
cloud environment
PKI Trust Models
trust management schemes
Trust management
TRUFL framework scales
transfer rates
public key infrastructure
distributed trust mechanism
distributed trust management framework
digital signatures
data plane-control plane elements
Control Plane-Application Plane
control plane elements
cloud infrastructure
centralized trust management
trust establishment
computer network security
public key cryptography
Public key
SDN
Metrics
pubcrawl
Human behavior
Resiliency
software defined networking
computer network management
Trusted Computing
Protocols
authorization
Scalability
Cloud Computing
biblio
BARS: A Blockchain-Based Anonymous Reputation System for Trust Management in VANETs
Submitted by aekwall on Mon, 11/18/2019 - 11:49am
privacy preservation
vehicular ad-hoc networks
vehicular ad hoc networks
VANET
Trust management
telecommunication security
security services
Scalability
revocation transparency
Resiliency
reputation system
public key infrastructure
public key cryptography
Public key
pubcrawl
privacy protection
authentication protocol
privacy
PKI Trust Models
Metrics
message authentication
internal vehicles
Human behavior
forged message broadcasting
distributed trust management
data privacy
Data models
Cryptographic Protocols
blockchain-based anonymous reputation system
blockchain
Bars
biblio
Conifer: Centrally-Managed PKI with Blockchain-Rooted Trust
Submitted by aekwall on Mon, 11/18/2019 - 11:48am
public keys
centralized transparency
centrally-managed PKI
Conifer
CONIKS
cryptographic identities
domain names
highly decentralized trust
insecure networks
central trusted parties
secure distributed ledger
secure naming systems
security guarantees
traditional centralized PKIs
traditional centralized-trust systems
trustworthy binding
user-facing names
PKI Trust Models
internet
Scalability
secure communications
Resiliency
Human behavior
pubcrawl
bitcoin
Metrics
blockchain
Monitoring
data structures
Public key
public key cryptography
flexibility
active attackers
blockchain-agnostic way
blockchain-rooted trust
blockchains
biblio
Blockchain-Based PKI Solutions for IoT
Submitted by aekwall on Mon, 11/18/2019 - 11:48am
public key cryptography
PKI Trust Models
scalable PKI
robust PKI
publicly verifiable trusted third parties
public key certificates
peer-to-peer data store
Ethereum Light Sync client
Ethereum blockchain
Emercoin Name Value Service
decentralized trusted third parties
consensus protocols
certification authority
blockchain-based PKI solutions
blockchain-based alternatives
public key infrastructure
IoT
Public key
smart contracts
blockchain
Metrics
Peer-to-peer computing
bitcoin
pubcrawl
Human behavior
Resiliency
Trusted Computing
Protocols
data integrity
Internet of Things
Scalability
computer network security
biblio
Turning Trust Around: Smart Contract-Assisted Public Key Infrastructure
Submitted by aekwall on Mon, 11/18/2019 - 11:48am
contracts
PKI Trust Models
trust experience
smart contract-assisted public key infrastructure
smart contract-assisted PKI extension
PKI
dynamic trust state
dynamic trust network
dynamic trust management
Decentralized Trust
CT
certification
certificate transparency
certificate authority
Browsers
Scalability
public key cryptography
Public key
digital signatures
Policy
Ecosystems
smart contract
blockchain
Metrics
pubcrawl
Human behavior
Resiliency
Trusted Computing
Protocols
biblio
nQUIC: Noise-Based QUIC Packet Protection
Submitted by aekwall on Mon, 11/18/2019 - 11:48am
Scalability
Resiliency
Human behavior
pubcrawl
Metrics
PKI Trust Models
biblio
Flexible Certificate Revocation List for Efficient Authentication in IoT
Submitted by aekwall on Mon, 09/23/2019 - 10:25am
authentication
certificate revocation list
Compositionality
Human behavior
Internet-of-Things
Metrics
Predictive Metrics
PKI Trust Models
provable security
pubcrawl
public key infrastructure
Resiliency
Scalability
« first
‹ previous
1
2
3
4
5
next ›
last »