Certificate-based authentication using hardware cryptographic devices

被引:0
|
作者
Dolezel R. [1 ]
Pedersen J.M. [2 ]
机构
[1] Faculty of Electrical Engineering and Communication, Department of Telecommunications, Brno University of Technology, Brno 612 00
[2] Section for Networking and Security, Department of Electronic Systems, Aalborg University, Aalborg DK-9220
来源
Advances in Intelligent and Soft Computing | 2011年 / 102卷
关键词
Cryptography;
D O I
10.1007/978-3-642-23154-4_57
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper gives an introduction to certificates as authentication mediums and their security storages. An appropriate cryptographic background is also stated. A scenario for using certificates and their security storages is presented. The scenario was practically implemented. The main goal is a detailed description of an authentication process held in a web environment. Certificates with matching private keys and hardware cryptographic devices are involved in the authentication process. The description is mainly aimed at certificates, hardware cryptographic devices and their usage in significant parts of a secured connection establishment. © 2011 Springer-Verlag Berlin Heidelberg.
引用
收藏
页码:519 / 531
页数:12
相关论文
共 50 条
  • [31] Towards Certificate-Based Group Encryption
    Ren, Yili
    Luo, Xiling
    Wu, Qianhong
    Liu, Joseph K.
    Zhang, Peng
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 296 - 305
  • [32] Improved for certificate-based signature scheme
    Department of Computer Science, Minnan Normal University, Zhangzhou
    Fujian
    363000, China
    Beijing Youdian Daxue Xuebao, 3 (48-52):
  • [33] Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks
    Buttyan, Levente
    Dora, Laszlo
    Martinelli, Fabio
    Petrocchi, Marinella
    COMPUTER COMMUNICATIONS, 2010, 33 (08) : 907 - 922
  • [34] Cryptanalysis of a Certificate-Based on Signature Scheme
    Cheng, Lin
    Xiao, Ying
    Wang, Gang
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 2821 - 2825
  • [35] Key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks
    李发根
    高军涛
    刘双根
    胡予濮
    JournalofShanghaiJiaotongUniversity(Science), 2006, (02) : 152 - 157
  • [36] Key management using certificate-based cryptosystem in ad hoc networks
    Key Lab. of Computer Networks and Information Security, Xidian Univ., Xi'an 710071, China
    J. Shanghai Jiaotong Univ. Sci., 2006, 2 (152-157):
  • [37] Forward-Secure Certificate-Based Encryption
    Lu, Yang
    Li, Jiguo
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 57 - 60
  • [38] Certificate-based authorization policy in a pki environment
    Thompson, Mary R.
    Essiari, Abdelilah
    Mudumbai, Srilekha
    2003, Association for Computing Machinery (06)
  • [39] A certificate-based watermarking scheme for coloured images
    Wu, N. -I.
    Wang, C. -M.
    Tsai, C. -S.
    Hwang, M. -S.
    IMAGING SCIENCE JOURNAL, 2008, 56 (06): : 326 - 332
  • [40] Certificate-based signature scheme in the standard model
    Zhou, Caixue
    Cui, Zongmin
    IET INFORMATION SECURITY, 2017, 11 (05) : 256 - 260