IRBA: An identity-based cross-domain authentication scheme for the internet of things

X Jia, N Hu, S Su, S Yin, Y Zhao, X Cheng, C Zhang - Electronics, 2020 - mdpi.com
The incredible development of Internet of things technology promotes the integration of
application systems, which enable people to enjoy the convenience of multiple application …

[PDF][PDF] PKI 技术的近年研究综述

林璟锵, 荆继武, 张琼露, 王展 - 密码学报, 2015 - jcr.cacrnet.org.cn
公钥基础设施(Public Key Infrastructure, PKI) 是典型的密码应用技术. 在PKI 系统中,
由证书认证机构(Certification Authority, CA) 签发数字证书, 绑定PKI 用户的身份信息和公钥 …

BlockCAM: a blockchain-based cross-domain authentication model

W Wang, N Hu, X Liu - … on Data Science in Cyberspace (DSC), 2018 - ieeexplore.ieee.org
In a distributed network environment, companies and institutions have their own sharing
resource. To prevent unauthorized users to access these shared resources, cross-domain …

BTCAS: A blockchain-based thoroughly cross-domain authentication scheme

H Zhang, X Chen, X Lan, H Jin, Q Cao - Journal of Information Security and …, 2020 - Elsevier
In many real resource access scenarios, the parties who require to establish communication
may be unable to effectively identify and verify some authentication messages of the other …

Cutting-Edge Assets for Trust in 5G and Beyond: Requirements, State of the Art, Trends, and Challenges

JM Jorquera Valero, PM Sánchez Sánchez… - ACM Computing …, 2023 - dl.acm.org
In 5G and beyond, the figure of cross-operator/domain connections and relationships grows
exponentially among stakeholders, resources, and services, with reputation-based trust …

Conditional privacy-preserving message authentication scheme for cross-domain Industrial Internet of Things

H Zhong, C Gu, Q Zhang, J Cui, C Gu, D He - Ad Hoc Networks, 2023 - Elsevier
Abstract Industrial Internet of Things (IIoT) is a key technology for building intelligent
manufacturing, optimizing industrial device management, and improving productivity …

Cloud based secure and privacy enhanced authentication & authorization protocol

U Khalid, A Ghafoor, M Irum, MA Shibli - Procedia Computer Science, 2013 - Elsevier
Cloud computing is an emerging computing model which facilitates organizations and the IT
industry. It helps them to multiply or lessen their resources according to their operational …

Trust enhancement scheme for cross domain authentication of PKI system

Y Chen, G Dong, J Bai, Y Hao, F Li… - … Conference on Cyber …, 2019 - ieeexplore.ieee.org
Public Key Infrastructure (PKI) has been popularized in many scenarios such as e-
government applications, enterprises, etc. Due to the construction of PKI system of various …

Research on Multidomain Authentication of IoT Based on Cross‐Chain Technology

D Li, J Yu, X Gao, N Al-Nabhan - Security and Communication …, 2020 - Wiley Online Library
Blockchain is an innovated and revolutionized technology, which has attracted wide
attention from academia and industry. At present, blockchain has been widely used in …

TRIMS, a privacy-aware trust and reputation model for identity management systems

FG Mármol, J Girao, GM Pérez - Computer Networks, 2010 - Elsevier
Electronic transactions are becoming more important everyday. Several tasks like buying
goods, booking flights or hotel rooms, or paying for streaming a movie, for instance, can be …