Articles with "key infrastructure" as a keyword



Accountable Bootstrapping Based on Attack Resilient Public Key Infrastructure and Secure Zero Touch Provisioning

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3231015

Abstract: Internet Engineering Task Force (IETF) issued Secure Zero Touch Provisioning (SZTP) as a provisioning technique for networking devices without human intervention. SZTP standardizes the provisioning workflow from device enrollment to bootstrapping process. Unfortunately, implementing a… read more here.

Keywords: key infrastructure; accountable bootstrapping; secure zero; public key ... See more keywords
Photo by arthurbizkit from unsplash

Blockchain-Based Public Key Infrastructure: A Transparent Digital Certification Mechanism for Secure Communication

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Network"

DOI: 10.1109/mnet.101.2000532

Abstract: Public Key Infrastructure (PKI) has been considered to be an enabler of secure communication, while, due to its complex and centralized design, there have been instances in the past for Certification Authority's (CA) misbehaving and… read more here.

Keywords: blockchain based; mechanism; secure; public key ... See more keywords