Non-interactive Certificate Update Protocol for Efficient Authentication in IoT
Abstract
References
Index Terms
- Non-interactive Certificate Update Protocol for Efficient Authentication in IoT
Recommendations
Flexible certificate revocation list for efficient authentication in IoT
IOT '18: Proceedings of the 8th International Conference on the Internet of ThingsWhen relying on public key infrastructure (PKI) for authentication, whether a party can be trusted primarily depends on its certificate status. Bob's certificate status can be retrieved by Alice through her interaction with Certificate Authority (CA) in ...
Efficient Non-interactive Deniable Authentication Protocols
CIT '05: Proceedings of the The Fifth International Conference on Computer and Information TechnologyDeniable authentication protocol is an authentication protocol that allows a sender to authenticate a message for a receiver, in a way that the receiver cannot convince a third party that such authentication ever took place. In recent years, due to the ...
A New ID-Based Deniable Authentication Protocol
Deniable authenticated protocol is a new cryptographic authentication protocol that enables a designated receiver to identify the source of a given message without being able to prove the identity of the sender to a third party. Therefore, it can be ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 135Total Downloads
- Downloads (Last 12 months)10
- Downloads (Last 6 weeks)1
Other Metrics
Citations
Cited By
View allView Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in