1,243 Hits in 3.8 sec

Designing a Framework for Digital KYC Processes Built on Blockchain-Based Self-Sovereign Identity

Vincent Schlatt, Johannes Sedlmeir, Simon Feulner, Nils Urbach
2021 Information & Management  
We demonstrate how blockchain-based self-sovereign identity (SSI) can solve the challenges of KYC.  ...  From a technical perspective, we abstracted from their solution based on Hyperledger Indy to a more generic perspective on SSI and extended their findings by rigorously evaluating the design.  ...  An identity provider, such as Facebook or Google, manages users' digital identities and makes them available to relying parties.  ... 
doi:10.1016/ fatcat:6d7gzvptubfxfdtcsig64pvyey

Privacy Enhanced Fast MutualAuthentication in 5G Network UsingIdentity Based Encryption

Mohsin Khan, Valtteri Niemi
2017 Journal of ICT Standardization  
The proposed solution can be extended to a mutual authentication and key agreement protocol between a serving network (SN) and a user equipment (UE).  ...  This paper looks into the problem of concealing long-term identity of a subscriber and presents a protocol based on identity based encryption (IBE) to tackle it.  ...  However, CertV1 can also be extended to such a mutual authentication protocol.  ... 
doi:10.13052/jicts2245-800x.514 fatcat:rmb5o3wjonanphfdnbgqfbig44

Page 6573 of Mathematical Reviews Vol. , Issue 99i [page]

1999 Mathematical Reviews  
abstract) (121-136); William Aiello, Sachin Lodha and Rafail Ostrovsky, Fast digital identity revocation (extended abstract) (137-152).  ...  The DH-protocol in question has been carried out in (Z/pZ)* where p is a 129-digit prime of special form. Our method employed the number field sieve.  ... 

Privacy-Preserving Identifiers for IoT: A Systematic Literature Review

Mahdi Akil, Lejla Islami, Simone Fischer-Hubner, Leonardo A. Martucci, Albin Zuccato
2020 IEEE Access  
The revocation of pseudonyms in a centralized IdM architecture requires a revocation server that keeps track of revoked identities and pseudonyms.  ...  TABLE 1 : 1 Selected Databases Database Type URL IEEE Xplore Digital Library ACM Digital Library Digital Library Web of Science Bibliographic  ... 
doi:10.1109/access.2020.3023659 fatcat:dc4dbijzljfyxn7hsrkuyfriby

Access Control for Binary Integrity Protection using Ethereum

Oliver Stengele, Andreas Baumeister, Pascal Birnstill, Hannes Hartenstein
2019 Proceedings of the 24th ACM Symposium on Access Control Models and Technologies - SACMAT '19  
Smart Contracts are used to enforce access control over the publication and revocation of integrity preserving information, whereas the peer-to-peer network serves as a fast, global communication service  ...  Our implementation incurs costs comparable to registration fees for centralised software distribution platforms but allows publication and revocation of individual binaries within minutes.  ...  Similarly, the high global availability and fast communication speed of the underlying peer-to-peer network is not only necessary for its primary function of maintaining and extending the Blockchain but  ... 
doi:10.1145/3322431.3325108 dblp:conf/sacmat/StengeleBBH19 fatcat:ya6e2puhljgbziollfvbwcviwu


D. R. Engler, M. F. Kaashoek, J. O'Toole
1995 ACM SIGOPS Operating Systems Review  
This separation of resource protection from management allows application-specific customization of traditional operating system abstractions by extending, specializing, or even replacing libraries.  ...  For instance, virtual memory and interprocess communication abstractions are implemented entirely within an application-level library.  ...  , extended, or replaced.  ... 
doi:10.1145/224057.224076 fatcat:3gacher7fzhwbhdrde6yezfp2i


D. R. Engler, M. F. Kaashoek, J. O'Toole
1995 Proceedings of the fifteenth ACM symposium on Operating systems principles - SOSP '95  
This separation of resource protection from management allows application-specific customization of traditional operating system abstractions by extending, specializing, or even replacing libraries.  ...  For instance, virtual memory and interprocess communication abstractions are implemented entirely within an application-level library.  ...  , extended, or replaced.  ... 
doi:10.1145/224056.224076 dblp:conf/sosp/EnglerKO95 fatcat:lkth4d5x4bh37ob3urikb4vcz4

Towards Practical Attribute-Based Signatures [chapter]

Brinda Hampiholi, Gergely Alpár, Fabian van den Broek, Bart Jacobs
2015 Lecture Notes in Computer Science  
An attribute-based signature (ABS) is a special digital signature created using a dynamic set of issued attributes.  ...  In this paper, we propose an ABS scheme based on the existing IRMA technology, extending the currently available IRMA devices with ABS functionality.  ...  With the current public-key infrastructure (PKI) based signature, a doctor has to reveal his full identity, public-key certificate every time he digitally signs a document.  ... 
doi:10.1007/978-3-319-24126-5_18 fatcat:jpbsayesljalth3r6ihtmd4wxy

On the Security and Privacy of Internet of Things Architectures and Systems

Emmanouil Vasilomanolakis, Jorg Daubert, Manisha Luthra, Vangelis Gazis, Alex Wiesmaier, Panayotis Kikiras
2015 2015 International Workshop on Secure Internet of Things (SIoT)  
With such a mechanism, digital signatures ensure accountability, and revocable pseudonymity is provided as no single entity can link the signature to an identity.  ...  However, availability only seems to be considered to a limited extend by the architectures.  ... 
doi:10.1109/siot.2015.9 dblp:conf/siot/Vasilomanolakis15 fatcat:pnsffdx5gbfl3fxfmglgwkxicy

Public-Key Infrastructure [chapter]

2013 Wireless Mobile Internet Security  
partially funded by the Interuniversity Attraction Poles Programme Belgian State, Belgian Science Policy, the Research Fund K.U.Leuven and the IWT-SBO project (ADAPID) "Advanced Applications for Electronic Identity  ...  OCSP is an Internet protocol used for obtaining the revocation status of a digital certificate.  ...  For digital signatures, a longer (e.g., 6-digit) PIN code could be used, whereas for identity proofs a standard 4-digit PIN code is sufficient.  ... 
doi:10.1002/9781118512920.ch7 fatcat:hocfzfhi4rbuhmssop2hkwbc64

The e-Government digital credentials

Flavio Corradini, Eleonora Paganelli, Alberto Polzonetti
2007 International Journal of Electronic Governance  
The paper concludes by outlining future trends and the potentiality of the extended digital identity in both public and private sectors.  ...  In this paper, after having examined the European identity management policies, we explain the differences between digital identity and digital citizenship and introduce digital credentials.  ...  A concept for an extended digital identity Numerous European countries are engaged in projects for digital citizen cards.  ... 
doi:10.1504/ijeg.2007.014341 fatcat:zlniyd657fdejn3lrg6nh4kqea

RITM: Revocation in the Middle

Pawel Szalachowski, Laurent Chuat, Taeho Lee, Adrian Perrig
2016 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS)  
We also propose to take advantage of content-delivery networks (CDNs) and argue that they would constitute a fast and cost-effective way to disseminate revocations.  ...  RITM provides a secure revocation-checking mechanism that preserves user privacy.  ...  Although many revocation schemes ignore the revocation checking of CA certificates, RITM can be extended to support this feature.  ... 
doi:10.1109/icdcs.2016.91 dblp:conf/icdcs/SzalachowskiCLP16 fatcat:x2u7xku3rbfhti3ivukjtzkgm4

Automated User Authentication in Wireless Public Key Infrastructure for Mobile Devices using Aadhar card

Krishna Prakasha, Balachandra Muniyal, Vasundhara Acharya
2019 IEEE Access  
The wireless public key infrastructure issues a digital certificate to the valid user.  ...  Aadhar project is developed by the Unique Identification Authority of India by merging biometrics and digitization.  ...  Efficient Certificate Revocation List (ECRL) [3] is used for fast verification of digital certificates.  ... 
doi:10.1109/access.2019.2896324 fatcat:qekruagonbb7hbtvfylzukhgsu

On the Performance of Secure Vehicular Communication Systems

G. Calandriello, P. Papadimitratos, Jean-Pierre Hubaux, A. Lioy
2011 IEEE Transactions on Dependable and Secure Computing  
Essentially, in a given area and time, every recipient can perform the fast revocation status check.  ...  Our findings and mechanisms also apply to their work, complementing and extending it.  ... 
doi:10.1109/tdsc.2010.58 fatcat:mllldpeffvfdroi244oljkfzia

A brief overview and an experimental evaluation of data confidentiality measures on the cloud

Hussain Aljafer, Zaki Malik, Mohammed Alodib, Abdelmounaam Rezgui
2014 Journal of Innovation in Digital Ecosystems  
Security and protection Cloud Encryption Measurement A B S T R A C T Due to the many advantages offered by the cloud computing paradigm, it is fast becoming an enabling technology for many organizations  ...  The approach centers on two abstractions: the STT on the client side and the CRE on the cloud server.  ...  Another issue with it is that it needed to be extended to public clouds.  ... 
doi:10.1016/j.jides.2015.02.001 fatcat:7xaj4fzat5g3xcwsyyop3knpg4
« Previous Showing results 1 — 15 out of 1,243 results