Search for dissertations about: "PKI"
Showing result 1 - 5 of 7 swedish dissertations containing the word PKI.
-
1. Public Key Infrastructure and its applications for resource-constrained IoT
Abstract : The Internet of Things (IoT) is rapidly expanding and IoT devices are being deployed in security-critical scenarios, such as in critical infrastructure monitoring and within e-health, and privacy-sensitive applications in hospitals and homes. With this, questions of security and safety become paramount. READ MORE
-
2. Secure and Privacy Preserving Vehicular Communication Systems: Identity and Credential Management Infrastructure
Abstract : Vehicular Communication (VC) systems can greatly enhance road safety and transportation efficiency. Vehicles are equipped with sensors to sense their surroundings and the internal Controller Area Network (CAN) bus. Hence, vehicles are becoming part of a large-scale network, the so-called Internet of Vehicles (IoV). READ MORE
-
3. The Key to Intelligent Transportation Systems: Identity and Credential Management for Secure and Privacy-Preserving Vehicular Communication Systems
Abstract : Vehicular Communication (VC) systems can greatly enhance road safety and transportation efficiency and enable a variety of applications providing traffic efficiency, environmental hazards, road conditions and infotainment. Vehicles are equipped with sensors and radars to sense their surroundings and external environment, as well as with an internal Controller Area Network (CAN) bus. READ MORE
-
4. Optical Document Security: Measurement, Characterization and Visualization : in the Light of Visual Evaluation
Abstract : Documents of high value, such as passports, tickets and banknotes, facilitate means for authentication. Authentication processes aim at mitigating counterfeit “passable products”. READ MORE
-
5. Understanding Certificate Revocation
Abstract : Correct certificate revocation practices are essential to each public-key infrastructure. While there exist a number of protocols to achieve revocation in PKI systems, there has been very little work on the theory behind it: Which different types of revocation can be identified? What is the intended effect of a specific revocation type to the knowledge base of each entity?As a first step towards a methodology for the development of reliable models, we present a graph-based formalism for specification and reasoning about the distribution and revocation of public keys and certificates. READ MORE