Certificate-based authentication using hardware cryptographic devices

被引:0
|
作者
Dolezel R. [1 ]
Pedersen J.M. [2 ]
机构
[1] Faculty of Electrical Engineering and Communication, Department of Telecommunications, Brno University of Technology, Brno 612 00
[2] Section for Networking and Security, Department of Electronic Systems, Aalborg University, Aalborg DK-9220
来源
Advances in Intelligent and Soft Computing | 2011年 / 102卷
关键词
Cryptography;
D O I
10.1007/978-3-642-23154-4_57
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper gives an introduction to certificates as authentication mediums and their security storages. An appropriate cryptographic background is also stated. A scenario for using certificates and their security storages is presented. The scenario was practically implemented. The main goal is a detailed description of an authentication process held in a web environment. Certificates with matching private keys and hardware cryptographic devices are involved in the authentication process. The description is mainly aimed at certificates, hardware cryptographic devices and their usage in significant parts of a secured connection establishment. © 2011 Springer-Verlag Berlin Heidelberg.
引用
收藏
页码:519 / 531
页数:12
相关论文
共 50 条
  • [1] Enhanced Certificate-Based Authentication for Distributed Environment
    Jesudoss, A.
    Subramaniam, N. P.
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 2, 2015, 325 : 675 - 685
  • [2] X.509 certificate-based adult authentication
    Korea Information Security Agency, 78, Garak-dong, Songpa-Gu, Seoul 138-803, Korea, Republic of
    不详
    WSEAS Trans. Inf. Sci. Appl., 2006, 5 (894-898):
  • [3] TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication
    O'Neill, Mark
    Heidbrink, Scott
    Ruoti, Scott
    Whitehead, Jordan
    Bunker, Dan
    Dickinson, Luke
    Hendershot, Travis
    Reynolds, Joshua
    Seamons, Kent
    Zappala, Daniel
    PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), 2017, : 609 - 624
  • [4] Towards Certificate-Based Authentication for Future Mobile Communications
    Kpatcha Bayarou
    Matthias Enzmann
    Elli Giessler
    Michael Haisch
    Brian Hunter
    Mohammad Ilyas
    Sebastian Rohr
    Markus Schneider
    Wireless Personal Communications, 2004, 29 : 283 - 301
  • [5] Network Mobility Route Optimization with Certificate-based Authentication
    Bauer, Christian
    2009 FIRST INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, 2009, : 189 - 194
  • [6] Towards certificate-based authentication for future mobile communications
    Bayarou, K
    Enzmann, M
    Giessler, E
    Haisch, M
    Hunter, B
    Ilyas, M
    Rohr, S
    Schneider, M
    WIRELESS PERSONAL COMMUNICATIONS, 2004, 29 (3-4) : 283 - 301
  • [7] An Anonymous and Efficient Certificate-Based Identity Authentication Protocol for VANET
    Qiao, Zirui
    Ma, Kui
    Zhou, Yanwei
    Yang, Qiliang
    Xia, Zhe
    Yang, Bo
    Zhang, Mingwu
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 11232 - 11245
  • [8] Certificate-Based IP Multimedia Subsystem Authentication and Key Agreement
    Chiang, Wei-Kuo
    Lin, Ping-Chun
    INFORMATION TECHNOLOGY: NEW GENERATIONS, 2016, 448 : 177 - 188
  • [9] AN EXTENDED CERTIFICATE-BASED AUTHENTICATION AND SECURITY PROTOCOL FOR MOBILE NETWORKS
    Lee, Cheng-Chi
    Liao, I-En
    Hwang, Min-Shiang
    INFORMATION TECHNOLOGY AND CONTROL, 2009, 38 (01): : 61 - 66
  • [10] Certificate-based, Disruption-tolerant Authentication System with Automatic CA Certificate Distribution for eduroam
    Liu, Hao
    Goto, Hideaki
    2014 38TH ANNUAL IEEE INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW 2014), 2014, : 169 - 173