Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
An Efficient Dynamic and Distributed Cryptographic Accumulator
ISC '02 Proceedings of the 5th International Conference on Information Security
A novel approach to certificate revocation management
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Tradeoffs in certificate revocation schemes
ACM SIGCOMM Computer Communication Review
Secure multicast groups on ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Secure Service and Network Framework for Mobile Ethernet
Wireless Personal Communications: An International Journal
Optimized Certificates --- A New Proposal for Efficient Electronic Document Signature Validation
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Efficient user revocation for privacy-aware PKI
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Design and analysis of a lightweight certificate revocation mechanism for VANET
Proceedings of the sixth ACM international workshop on VehiculAr InterNETworking
Evaluation of certificate validation mechanisms
Computer Communications
A practical and efficient tree-list structure for public-key certificate validation
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Decentralised access control in 802.11 networks
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
A new united certificate revocation scheme in grid environments
GCC'05 Proceedings of the 4th international conference on Grid and Cooperative Computing
Augmented certificate revocation lists
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
On the self-similarity nature of the revocation data
ISC'12 Proceedings of the 15th international conference on Information Security
Impact of the revocation service in PKI prices
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Hi-index | 0.01 |
Delta-certificate revocation lists (delta-CRLs) were designed to provide a more efficient way to distribute certificate status information. However, as this paper shows, in some environments the benefits of using delta-CRLs will be minimal if delta-CRLs are used as was originally intended. This paper provides an analysis of delta-CRLs that demonstrates the problems associated with issuing delta-CRLs in the 驴traditional驴 manner. A new, more efficient technique for issuing delta-CRLs, sliding window delta-CRLs, is presented.