IRBA: An identity-based cross-domain authentication scheme for the internet of things
The incredible development of Internet of things technology promotes the integration of
application systems, which enable people to enjoy the convenience of multiple application …
application systems, which enable people to enjoy the convenience of multiple application …
[PDF][PDF] PKI 技术的近年研究综述
林璟锵, 荆继武, 张琼露, 王展 - 密码学报, 2015 - jcr.cacrnet.org.cn
公钥基础设施(Public Key Infrastructure, PKI) 是典型的密码应用技术. 在PKI 系统中,
由证书认证机构(Certification Authority, CA) 签发数字证书, 绑定PKI 用户的身份信息和公钥 …
由证书认证机构(Certification Authority, CA) 签发数字证书, 绑定PKI 用户的身份信息和公钥 …
BlockCAM: a blockchain-based cross-domain authentication model
W Wang, N Hu, X Liu - … on Data Science in Cyberspace (DSC), 2018 - ieeexplore.ieee.org
In a distributed network environment, companies and institutions have their own sharing
resource. To prevent unauthorized users to access these shared resources, cross-domain …
resource. To prevent unauthorized users to access these shared resources, cross-domain …
BTCAS: A blockchain-based thoroughly cross-domain authentication scheme
In many real resource access scenarios, the parties who require to establish communication
may be unable to effectively identify and verify some authentication messages of the other …
may be unable to effectively identify and verify some authentication messages of the other …
Cutting-Edge Assets for Trust in 5G and Beyond: Requirements, State of the Art, Trends, and Challenges
JM Jorquera Valero, PM Sánchez Sánchez… - ACM Computing …, 2023 - dl.acm.org
In 5G and beyond, the figure of cross-operator/domain connections and relationships grows
exponentially among stakeholders, resources, and services, with reputation-based trust …
exponentially among stakeholders, resources, and services, with reputation-based trust …
Conditional privacy-preserving message authentication scheme for cross-domain Industrial Internet of Things
Abstract Industrial Internet of Things (IIoT) is a key technology for building intelligent
manufacturing, optimizing industrial device management, and improving productivity …
manufacturing, optimizing industrial device management, and improving productivity …
Cloud based secure and privacy enhanced authentication & authorization protocol
Cloud computing is an emerging computing model which facilitates organizations and the IT
industry. It helps them to multiply or lessen their resources according to their operational …
industry. It helps them to multiply or lessen their resources according to their operational …
Trust enhancement scheme for cross domain authentication of PKI system
Y Chen, G Dong, J Bai, Y Hao, F Li… - … Conference on Cyber …, 2019 - ieeexplore.ieee.org
Public Key Infrastructure (PKI) has been popularized in many scenarios such as e-
government applications, enterprises, etc. Due to the construction of PKI system of various …
government applications, enterprises, etc. Due to the construction of PKI system of various …
Research on Multidomain Authentication of IoT Based on Cross‐Chain Technology
D Li, J Yu, X Gao, N Al-Nabhan - Security and Communication …, 2020 - Wiley Online Library
Blockchain is an innovated and revolutionized technology, which has attracted wide
attention from academia and industry. At present, blockchain has been widely used in …
attention from academia and industry. At present, blockchain has been widely used in …
TRIMS, a privacy-aware trust and reputation model for identity management systems
Electronic transactions are becoming more important everyday. Several tasks like buying
goods, booking flights or hotel rooms, or paying for streaming a movie, for instance, can be …
goods, booking flights or hotel rooms, or paying for streaming a movie, for instance, can be …