Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Relationship Management: Secure Collaboration in a Ubiquitous Environment
IEEE Pervasive Computing
WebDAVA: An Administrator-Free Approach To Web File-Sharing
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Scientific Grid Computing: The First Generation
Computing in Science and Engineering
Linking remote attestation to secure tunnel endpoints
Proceedings of the first ACM workshop on Scalable trusted computing
Threshold key issuing in identity-based cryptosystems
Computer Standards & Interfaces
Identity Based Multisignatures
Informatica
Efficient Certificateless Signature Schemes
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Beacon certificate push revocation
Proceedings of the 2nd ACM workshop on Computer security architectures
Trusted Computing: Security and Applications
Cryptologia
Hardware authentication leveraging performance limits in detailed simulations and emulations
Proceedings of the 46th Annual Design Automation Conference
Enhancing data security in ad hoc networks based on multipath routing
Journal of Parallel and Distributed Computing
Cultural and social aspects of security and privacy: the critical elements of trusted online service
UI-HCII'07 Proceedings of the 2nd international conference on Usability and internationalization
VisualSec: a secure message delivery scheme for online social networks based on profile images
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Constructions of certificate-based signature secure against key replacement attacks
Journal of Computer Security - The 2007 European PKI Workshop: Theory and Practice (EuroPKI'07)
On using home networks and cloud computing for a future internet of things
FIS'2009 Proceedings of the Second Future internet conference on Future internet
A new provably secure certificateless short signature scheme
Computers & Mathematics with Applications
Flexible secure inter-domain interoperability through attribute conversion
Information Sciences: an International Journal
The SSL landscape: a thorough analysis of the x.509 PKI using active and passive measurements
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Shibboleth and community authorization services: enabling role-based grid access
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part II
An efficient short certificate-based signature scheme
Journal of Systems and Software
An efficient certificateless signature scheme
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
ID-Based access control and authority delegations
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
An efficient RSA-based certificateless signature scheme
Journal of Systems and Software
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
Certificate-based signature: security model and efficient construction
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Hi-index | 4.10 |
Like other flexible objects, the public key infrastructure sacrifices someutility in trying to be all things to all people. Mainly, PKI's generic, all-purposeidentity certificates fall short of what the marketplace demands, forcingvendors to develop more economically efficient, useful, and imaginative businessmodels. Thus, we must adapt the PKI design to the real world rather than trying to constrain the real world to match the PKI. A variety of alternative approaches, ranging from simple workarounds to designing the application to sidestep PKI'sshortcomings entirely, can help solve the problems inherent in the standard X.509model.