Certificate-based authentication using hardware cryptographic devices

被引:0
|
作者
Dolezel R. [1 ]
Pedersen J.M. [2 ]
机构
[1] Faculty of Electrical Engineering and Communication, Department of Telecommunications, Brno University of Technology, Brno 612 00
[2] Section for Networking and Security, Department of Electronic Systems, Aalborg University, Aalborg DK-9220
来源
Advances in Intelligent and Soft Computing | 2011年 / 102卷
关键词
Cryptography;
D O I
10.1007/978-3-642-23154-4_57
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper gives an introduction to certificates as authentication mediums and their security storages. An appropriate cryptographic background is also stated. A scenario for using certificates and their security storages is presented. The scenario was practically implemented. The main goal is a detailed description of an authentication process held in a web environment. Certificates with matching private keys and hardware cryptographic devices are involved in the authentication process. The description is mainly aimed at certificates, hardware cryptographic devices and their usage in significant parts of a secured connection establishment. © 2011 Springer-Verlag Berlin Heidelberg.
引用
收藏
页码:519 / 531
页数:12
相关论文
共 50 条
  • [21] Certificate-based Signatures Revisited
    Wu, Wei
    Mu, Yi
    Susilo, Willy
    Huang, Xinyi
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2009, 15 (08) : 1659 - 1684
  • [22] A Certificate-Based Signcryption Scheme
    Luo, Ming
    Wen, Yingyou
    Zhao, Hong
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, 2008, : 17 - 23
  • [23] Dynamic Multiparty Authentication using Cryptographic Hardware for the Internet of Things
    Al-Aqrabi, Hussain
    Johnson, Anju P.
    Hill, Richard
    2019 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI 2019), 2019, : 21 - 28
  • [24] AMI Authentication Method based on Hardware Public Key Certificate using Unique Identifier
    Choi, Pil Joo
    Kim, Hyun Il
    Kim, Dong Kyue
    2015 INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2015, : 341 - 342
  • [25] A Study on Certificate-Based Trust in MANETs
    Narayan, K. Gowri Raghavendra
    Rao, T. Srinivasa
    Raju, P. Pothu
    Sudhakar, P.
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA ENGINEERING, 2018, 9 : 41 - 54
  • [26] A Lightweight Certificate-based Source Authentication Protocol for Group Communication in Hybrid Wireless/Satellite Networks
    Roy-Chowdhury, Ayan
    Baras, John S.
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [27] Short and Efficient Certificate-Based Signature
    Liu, Joseph K.
    Bao, Feng
    Zhou, Jianying
    NETWORKING 2011 WORKSHOPS, 2011, 6827 : 167 - 178
  • [28] On the security of a certificate-based signcryption scheme
    Yuan, Y. (ymyuan@xmu.edu.cn), 1600, CESER Publications, Post Box No. 113, Roorkee, 247667, India (49):
  • [29] Generic Construction of Certificate-based Encryption
    Lu, Yang
    Li, Jiguo
    Xia, Junmo
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1589 - +
  • [30] Efficient Certificate-Based Signature Scheme
    Ming, Yang
    Wang, Yumin
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 87 - +