Loading…
A Blockchain Decentralized Public Key Infrastructure Model
Konoplev, A. S., Busygin, A. G., Zegzhda, D. P.
Published in Automatic control and computer sciences (01.12.2018)
Published in Automatic control and computer sciences (01.12.2018)
Get full text
Journal Article
Loading…
Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data
Zhang, Yue, Yu, Jia, Hao, Rong, Wang, Cong, Ren, Kui
Published in IEEE transactions on dependable and secure computing (01.05.2020)
Published in IEEE transactions on dependable and secure computing (01.05.2020)
Get full text
Journal Article
Loading…
A Survey on Zero Trust Architecture: Challenges and Future Trends
He, Yuanhang, Huang, Daochao, Chen, Lei, Ni, Yi, Ma, Xiangjie
Published in Wireless communications and mobile computing (15.06.2022)
Published in Wireless communications and mobile computing (15.06.2022)
Get full text
Journal Article
Loading…
Blockchain-Based Certificate Transparency and Revocation Transparency
Wang, Ze, Lin, Jingqiang, Cai, Quanwei, Wang, Qiongxiao, Zha, Daren, Jing, Jiwu
Published in IEEE transactions on dependable and secure computing (01.01.2022)
Published in IEEE transactions on dependable and secure computing (01.01.2022)
Get full text
Journal Article
Loading…
Loading…
Server-Aided Public Key Encryption With Keyword Search
Chen, Rongmao, Mu, Yi, Yang, Guomin, Guo, Fuchun, Huang, Xinyi, Wang, Xiaofen, Wang, Yongjun
Published in IEEE transactions on information forensics and security (01.12.2016)
Published in IEEE transactions on information forensics and security (01.12.2016)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Evaluation of Algorithms for Orientation Invariant Inertial Gait Matching
Subramanian, Ravichandran, Sarkar, Sudeep
Published in IEEE transactions on information forensics and security (01.02.2019)
Published in IEEE transactions on information forensics and security (01.02.2019)
Get full text
Journal Article
Loading…
Loading…
Loading…
Certificate chain discovery in SPKI/SDSI
Clarke, Dwaine, Elien, Jean-Emile, Ellison, Carl, Fredette, Matt, Morcos, Alexander, Rivest, Ronald L.
Published in Journal of computer security (01.10.2001)
Published in Journal of computer security (01.10.2001)
Get full text
Journal Article
Loading…
Continuous Authentication of Automotive Vehicles Using Inertial Measurement Units
Baldini, Gianmarco, Geib, Filip, Giuliani, Raimondo
Published in Sensors (Basel, Switzerland) (30.11.2019)
Published in Sensors (Basel, Switzerland) (30.11.2019)
Get full text
Journal Article
Loading…
An SSI-Based Solution to Support Lawful Interception
Buccafurri, Francesco, Canino, Aurelio Loris, De Angelis, Vincenzo, Laurenda, Annunziata, Lax, Gianluca
Published in Applied sciences (01.02.2025)
Published in Applied sciences (01.02.2025)
Get full text
Journal Article
Loading…
A Survey on Life-Cycle-Oriented Certificate Management in Industrial Networking Environments
Göppert, Julian, Walz, Andreas, Sikora, Axel
Published in Journal of sensor and actuator networks (01.04.2024)
Published in Journal of sensor and actuator networks (01.04.2024)
Get full text
Journal Article
Loading…
Trust Model for the Russian Federation Digital Economy
Melnikov, Dmitry A., Releev, Yury F., Kvaratskheliya, Leonid D.
Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.06.2020)
Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.06.2020)
Get full text
Journal Article
Loading…