Filters








64,370 Hits in 5.8 sec

IPv4 Address Trading Using Resource Certificate

Cheol-Soon Park, Jae-Cheol Ryou, Yong-Tae Park
2010 Journal of Information Processing Systems  
Thus for quite some time, the problem of IP address shortage will persist. To solve the problem, we propose the mechanism of secure IP address trading.  ...  This mechanism is based on the Resource PKI (RPKI). The RPKI is the working item of IETF. This proposed mechanism maximizes the trust of IP address trading using RPKI.  ...  Characteristic of resource PKIs is the one-to-one mapping between EE certificates and signed objects e.g. ROAs. So the private key is used to sign only one object.  ... 
doi:10.3745/jips.2010.6.1.107 fatcat:d3wxdblvmbaf3av6rckuaquoym

DSO: Dependable Signing Overlay [chapter]

Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas Blough
2006 Lecture Notes in Computer Science  
The key idea is: replicate the key shares and make the signing servers anonymous to clients (and thus also to the would-be attackers), in addition to using threshold signing.  ...  This paper presents the architecture and protocols of DSO, and the analytical models for reliability and security analysis.  ...  On receiving the share, a share holder calculates the index keys using a number of (n b ) well-known consistent hash functions as in SOS [13] operated on the service key tag.  ... 
doi:10.1007/11767480_3 fatcat:hxxsdmcjnbacpi3lczol4o6mkm

Providing robust and ubiquitous security support for mobile ad-hoc networks

Jiej, Z. Petros, Haiyun Luo, Songwu Lu, Lixia Zhang
2001 Proceedings Ninth International Conference on Network Protocols ICNP 2001 ICNP-01  
We also update the secret shares to further enhance robustness against break-ins. Both simulations and implementation confirm the effectiveness of our design.  ...  In this paper, we describe a solution that supports ubiquitous security services for mobile hosts, scales to network size, and is robust against break-ins.  ...  No single entity in the network knows or holds the complete system secret (e.g., a certification authority's signing key).  ... 
doi:10.1109/icnp.2001.992905 dblp:conf/icnp/KongZLLZ01 fatcat:uvj4ir4irzaznmlm2ipwtnk76y

Resource Certification - A Public Key Infrastructure for IP Addresses and AS's

Geoff Huston, George Michaelson, Stephen Kent
2009 2009 IEEE Globecom Workshops  
The issues related to the application of this PKI to inter-domain routing security are considered, and the design, management and use of resource certificates, and the structure of the related Public Key  ...  This has particular application in the area of demonstrable attestations related to the right-of-use of IP addresses, and in the area of inter-domain routing security.  ...  It is also a property of this PKI that the key used to sign a CRL must be the same key used to sign the certificates being revoked, therefore binding a logical instance of a CA to a single key.  ... 
doi:10.1109/glocomw.2009.5360715 fatcat:mpxkqfqf6nat5l6bn624uti7he

Public Key Infrastructure: A Survey

Aysha Albarqi, Ethar Alzaid, Fatimah Al Ghamdi, Somaya Asiri, Jayaprakash Kar
2015 Journal of Information Security  
Public Key Infrastructure (PKI) is a way of providing security measures by implementing the means of key pairs among users.  ...  In this paper, an overview of the public key infrastructure is discussed that includes various components and operation, some well known PKIs and their comparisons.  ...  messages signed by the key holder.  ... 
doi:10.4236/jis.2015.61004 fatcat:3fbmf4zhszgvpg7pqcbllmlkqy

Improving the Security of SSO in Distributed Computer Network using Digital Certificate and one Time Password (OTP)

Vishal Patel, Riddhi Patel
2014 International Journal of Computer Applications  
A Single Sign-on is a new authentication mechanism for user to use multiple services provided by service provider in distributed computer network.  ...  It enables a legal user with a single credential to be authenticated by multiple service providers in distributed computer networks. This scheme has security flaws.  ...  This is the current example of single sign-on (SSO).  ... 
doi:10.5120/15489-4227 fatcat:s2bcmsllwngx3injhaju652kui

Preventing Unofficial Information Propagation [chapter]

Zhengyi Le, Yi Ouyang, Yurong Xu, James Ford, Fillia Makedon
2007 Lecture Notes in Computer Science  
This paper focuses on the propagation problem of digital credentials, which may contain sensitive information about a credential holder.  ...  The proposed approach in this paper uses shortlived credentials based on reverse forward secure signatures to remove this assumption and mitigate the damage caused by a dishonest or honest but compromised  ...  Any opinions, findings, and conclusions or recommendations expressed in this publication are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.  ... 
doi:10.1007/978-3-540-77048-0_9 fatcat:mum56frjifbndhjnkwdqarjvsu

A Survey of System Security in Contactless Electronic Passports [article]

Anshuman Sinha
2010 arXiv   pre-print
The electronic passport, supporting authentication using secure credentials on a tamper-resistant chip, is an attempt to improve on the security of the paper-based passport at minimum cost.  ...  The encoded data includes the holder's name, date of birth, and other identifying information for the holder or the document.  ...  The public key is signed and stored in one of the public data groups and the private key is stored in secure memory of the chip [21] .  ... 
arXiv:1011.2946v1 fatcat:a632gnz5ejbmxapgnwkcmcp6x4

Towards a Secure and Practical Multifunctional Smart Card [chapter]

Idir Bakdi
2006 Lecture Notes in Computer Science  
One of the most promising features of smart card technology is its potential to serve several applications using a single hardware token.  ...  Moreover, it protects the privacy of card holders by providing a possibility to use pseudonymous identities that cannot be linked to one another.  ...  All the DPs of a given group are assigned the same key pair (S g , P g ). DPs are grouped in order to protect the privacy of their holders.  ... 
doi:10.1007/11733447_2 fatcat:so26mlhmcba4nkgefyfzef7lf4

Design Patterns for Blockchain-based Self-Sovereign Identity [article]

Yue Liu, Qinghua Lu, Hye-Young Paik, Xiwei Xu
2020 arXiv   pre-print
Based on the lifecycles of three main objects involved in self-sovereign identity, we categorise the patterns into three groups: key management patterns, decentralised identifier management patterns, and  ...  The proposed patterns provide a systematic and holistic guide for architects to design the architecture of blockchain-based self-sovereign identity systems.  ...  The loss of signing key of one identifier does not affect the other identifiers. Drawbacks: • Cost.  ... 
arXiv:2005.12112v3 fatcat:7gli7txgyvdyjgysfsenvaltzm

A practical approach of ID-based cryptosystem in ad hoc networks

Heeyoul Kim, Jumin Song, Hyunsoo Yoon
2007 Wireless Communications and Mobile Computing  
Secure routing protocols such as SRP, Ariadne, ARAN, and SEAD [2] [3] [4] [5] , all assume that two nodes of the network share the pre-existing symmetric key  ...  Ad hoc network security research focuses on secure routing protocol, because routing protocol is a hot issue in ad hoc networks.  ...  The public key of him is set to Q ID = H 2 (ID). Sign.  ... 
doi:10.1002/wcm.500 fatcat:2jrvigqmqbbypeyoqjmdqjm3mq

Options for integrating eID and SAML

Detlef Hühnlein, Jörg Schwenk, Tobias Wich, Vladislav Mladenov, Florian Feldmann, Andreas Mayer, Johannes Schmölz, Bud Bruegger, Moritz Horsch
2013 Proceedings of the 2013 ACM workshop on Digital identity management - DIM '13  
of the German eID system, a more simple and secure variant for this SSO system, based on the SAML Holder-of-Key web browser profile. 5 See http://www.oasis-open.org/committees/security. 6 See  ...  Finally we describe a system setup based on the SAML Holder-of-Key web browser profile, which also mitigates interoperability problems. 2 See www.futureid.eu. 3 See www.skidentity.de. drivers), but this  ...  Optimized version of Holder-of-Key Web Browser SSO Profile We now show how to optimize the Holder-of-Key Web Browser SSO Profile to allow for efficient and secure authentication using eID-specific methods  ... 
doi:10.1145/2517881.2517892 dblp:conf/dim/HuhnleinSWMFMSBH13 fatcat:22vdtpuownhghjvfmqju6zz2ga

BlockPGP: A Blockchain-Based Framework for PGP Key Servers

Alexander Yakubov, Wazen Shbair, Radu State
2018 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)  
Our framework resolves some problems of PGP key servers focusing in particular on fast propagation of certificate revocation among key servers and elimination of man-in-the-middle risk.  ...  We also provided user access right control where only the certificate holder can change information related to the certificate.  ...  Given the potential vulnerabilities of PKI stemming from its single point of failure at CAs, it can be concluded that the whole PGP ecosystem becomes dependent on security of PKI.  ... 
doi:10.1109/candarw.2018.00065 dblp:conf/ic-nc/YakubovSS18 fatcat:7644yoeczvgnjh7detkozvhdu4

Enhancement of Security and Privacy in Biometric Passport Inspection System Using Face, Fingerprint, and Iris Recognition

V.K. NARENDIRA KUMAR, B. SRINIVASAN
2012 International Journal of Computer Network and Information Security  
The paper also provides a cryptographic security analysis of the e-passport using face fingerprint, and iris biometric that are intended to provide improved security in protecting biometric information  ...  of the e-passport bearer.  ...  It also digitally signs its part of the session key K IS .  ... 
doi:10.5815/ijcnis.2012.08.07 fatcat:eepgrn3tpfg2ji32afeziajtvm

Concurrently-secure credential ownership proofs

Siamak Shahandashti, Reihaneh Safavi-Naini, Joonsang Baek
2007 Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07  
We also propose proper security definitions for the protocol, aiming to protect the security of both the credential issuer and the credential owner against concurrent attacks.  ...  Finally, we show that the GQ identification protocol yields an efficient credential ownership proof for credentials signed by the RSA-FDH signature scheme of Bellare and Rogaway and prove the protocol  ...  [SBWP03] and the security model is mainly geared to ensure security of a single credential holder and with no concern about security of the credential issuer.  ... 
doi:10.1145/1229285.1229309 dblp:conf/ccs/ShahandashtiSB07 fatcat:j42ymtjprzaebdbyzyb7sh3xfi
« Previous Showing results 1 — 15 out of 64,370 results