Essays about: "Key revocation"

Showing result 1 - 5 of 11 essays containing the words Key revocation.

  1. 1. Public certificate management revisited : A summary of policy changes over a two-year period (2021-2023)

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Simon Bergström; Lowe Kozak; [2023]
    Keywords : Certificate Authority; Baseline Requirements; CA; BR;

    Abstract : The purpose of this study was to investigate how the Digital Certificate managementactors of the Public Key Infrastructure of the Internet have changed over the past two years(2021-2023). A set of one million registered top domains were queried with the intention ofmapping out their certificates. READ MORE

  2. 2. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Ziyad Elbanna; [2023]
    Keywords : Internet of things; Attribute based encryption; Fine-grained access control; Key revocation; Proxy re-encryption;

    Abstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE

  3. 3. BGPcredit : A Blockchain-based System for Securing BGP

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yu Yang Liu; [2022]
    Keywords : blockchain; RPKI; consensus algorithm; border gateway protocol; security; blockchain; RPKI; konsensusalgoritm; border gateway-protokoll; säkerhet;

    Abstract : Due to the absence of appropriate security mechanisms, even the latest version of Board Gateway Protocol (BGP) is still highly vulnerable to malicious routing hijacking. The original problem is that BGP allows router to accept any BGP update message without any extra validation process. READ MORE

  4. 4. Publicly Auditable Privacy Revocation in Practice

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Wilmer Nilsson; Patrik Kron; [2021]
    Keywords : crypto; cryptography; PAPR; conditional privacy; pseudonymous credentials; bitcoin; secret sharing schemes; secret sharing; VANETs; money laundering; trustless; publicly auditable privacy revocation; Technology and Engineering;

    Abstract : PAPR Credentials is the name of a not yet published credential scheme that provides conditional privacy for its users. This means that an administrator can choose to revoke a user's anonymity. READ MORE

  5. 5. A Cloud-native Vehicular Public Key Infrastructure : Towards a Highly-available and Dynamically- scalable VPKIaaS

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hamid Noroozi; [2021]
    Keywords : Security; Privacy; Vehicular PKI; VPKI; Identity and Credential Management; Vehicular Communications; VANETs; Availability; Scalability; Resilient; Efficiency; Microservice; Container Orchestration; Cloud; Pseudonym Transition; Pseudonym Unlinkability.; Säkerhet; personlig integritet; identitet- och behörighetsuppgifter; tillgänglighet; skalbarhet; motståndskraftig; effektivitet; moln; pseudonymitet; anonymitet; ospårbarhet.;

    Abstract : Efforts towards standardization of Vehicular Communication Systems (VCSs) have been conclusive on the use of Vehicular Public-Key Infrastructure (VPKI) for the establishment of trust among network participants. Employing VPKI in Vehicular Communication (VC) guarantees the integrity and authenticity of Cooperative Awareness Messages (CAMs) and Decentralized Environmental Notification Messages (DENMs). READ MORE