scroll to top
Your source for trusted research content

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "CERTIFICATE authority"

1 - 10 of 417 results for
 "CERTIFICATE authority"
Results per page:

Accountable and Transparent TLS Certificate Management: An Alternate Public-Key Infrastructure with Verifiable Trusted Parties.

Publication Type: Academic Journal

Source(s): Security & Communication Networks. 7/18/2018, p1-16. 16p.

Abstract: Current Transport Layer Security (TLS) Public-Key Infrastructure (PKI) is a vast and complex system; it consists of processes, policies, and entities that are responsible for a secure certificate management process. Among them, Certificate Authority (C...

Quantum Group Proxy Digital Signature based on Quantum Fourier Transform by Using Blinded and Non Blinded Trent.

Publication Type: Academic Journal

Source(s): International Journal of Information Security Science. Dec2017, Vol. 6 Issue 4, p79-86. 8p.


Abstract: In this study, quantum proxy group signature protocol based on the Quantum Fourier Transformation (QFT) is suggested. In this protocol, QFT is used to share signature with group members. So all proxy group members know only their part of the signature ...

CTB-PKI: Clustering and Trust Enabled Blockchain Based PKI System for Efficient Communication in P2P Network

Publication Type: Academic Journal

Source(s): IEEE Access, Vol 10, Pp 124277-124290 (2022)

Abstract: The decentralization feature of public and private blockchain-based applications is achieved by selecting different nodes as validators or Certificate Authority ( $CA$ ) for each transaction. Public blockchain uses Proof of Work ( $PoW$ ) to search for...

Certificate Transparency.

Publication Type: Periodical

Source(s): Communications of the ACM. Oct2014, Vol. 57 Issue 10, p40-46. 7p.


Abstract: The article offers the author's view on transparency among certificate authorities (CAs). He mentions an HTTPS certificate issued by Vasco Data Security International Inc.'s subsidiary DigiNotar BV which was applied for a man-in-the-middle assault to u...

New Identified Strategies to Forge Multivariate Signature Schemes

Publication Type: Academic Journal

Source(s): Symmetry, Vol 14, Iss 2368, p 2368 (2022)

Abstract: A rogue certificate authority (RCA) is a dishonest entity that has the trust of web browsers and users to produce valid key pairs which are vulnerable. This work analyses two acknowledged post-quantum secure Multivariate Quadratic Problem (MQP) based s...

SecureGuard: A Certificate Validation System in Public Key Infrastructure.

Publication Type: Academic Journal

Source(s): IEEE Transactions on Vehicular Technology. Jun2018, Vol. 67 Issue 6, p5399-5408. 10p.

Abstract: Certificate validation in public key infrastructure (PKI) is a vital phase of establishing secure connections on any network. There has been a great deal of speculation on how to efficiently validate digital certificates in PKI on which the security of...

An Efficient Authentication Scheme Using Blockchain as a Certificate Authority for the Internet of Drones

Publication Type: Academic Journal

Source(s): Drones, Vol 6, Iss 264, p 264 (2022)

Abstract: The Internet of Drones (IoD) has recently gained popularity in several military, commercial, and civilian applications due to its unique characteristics, such as high mobility, three-dimensional (3D) movement, and ease of deployment. Drones, on the oth...

An Intelligent Automated System for Detecting Malicious Vehicles in Intelligent Transportation Systems

Publication Type: Academic Journal

Source(s): Sensors, Vol 22, Iss 6318, p 6318 (2022)

Abstract: The exponential growth of intelligent vehicles(IVs) development has resulted in a complex network. As the number of IVs in a network increases, so does the number of connections. As a result, a great deal of data is generated. This complexity leads to ...

Cryptanalysis of RSA-Variant Cryptosystem Generated by Potential Rogue CA Methodology

Publication Type: Academic Journal

Source(s): Symmetry, Vol 14, Iss 1498, p 1498 (2022)

Abstract: Rogue certificate authorities (RCA) are third-party entities that intentionally produce key pairs that satisfy publicly known security requirements but contain weaknesses only known to the RCA. This work analyses the Murru–Saettone RSA variant scheme t...

Trust Model for the Russian Federation Digital Economy

Publication Type: Academic Journal

Source(s): Bezopasnostʹ Informacionnyh Tehnologij, Vol 27, Iss 2, Pp 47-64 (2020)

Abstract: The paper presents a study of modern trust models based on the Public Key Infrastructure (PKI) infrastructure, the purpose of which is to develop a Russian national trust model. To meet this goal, the necessity of creating a national infrastructure of ...