Search for dissertations about: "PKI"

Showing result 1 - 5 of 7 swedish dissertations containing the word PKI.

  1. 1. Public Key Infrastructure and its applications for resource-constrained IoT

    Author : Joel Höglund; Shahid Raza; Thiemo Voigt; Andrei Gurtov; Uppsala universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; IoT; PKI; cybersecurity; security; asymmetric cryptography; Contiki-NG; Computer Science with specialization in Computer Communication; Datavetenskap med inriktning mot datorkommunikation;

    Abstract : The Internet of Things (IoT) is rapidly expanding and IoT devices are being deployed in security-critical scenarios, such as in critical infrastructure monitoring and within e-health, and privacy-sensitive applications in hospitals and homes. With this, questions of security and safety become paramount. READ MORE

  2. 2. Secure and Privacy Preserving Vehicular Communication Systems: Identity and Credential Management Infrastructure

    Author : Mohammad Khodaei; Panos Papadimitratos; Tomas Olovsson; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Vehicular Communications; Security; Privacy; Access Control; Identity and Credential Management; Vehicular PKI; Electrical Engineering; Elektro- och systemteknik;

    Abstract : Vehicular Communication (VC) systems can greatly enhance road safety and transportation efficiency. Vehicles are equipped with sensors to sense their surroundings and the internal Controller Area Network (CAN) bus. Hence, vehicles are becoming part of a large-scale network, the so-called Internet of Vehicles (IoV). READ MORE

  3. 3. The Key to Intelligent Transportation Systems: Identity and Credential Management for Secure and Privacy-Preserving Vehicular Communication Systems

    Author : Mohammad Khodaei; Panagiotis Papadimitratos; Antonio Lioy; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Security; Privacy; Vehicular PKI; VPKI; Identity and Credential Management; Vehicular Communications; VANETs; Availability; Scalability; Resilient; Efficiency; Micro-service; Container Orchestration; Cloud;  Certificate Revocation List; Location Privacy; Mix-zones; Pseudonymity; Anonymity; Untraceability; Pseudonym Transition; Pseudonym Unlinkability.; Säkerhet; personlig integritet; identitet- och behörighetsuppgifter; tillgänglighet; skalbarhet; motståndskraftig; effektivitet; moln; pseudonymitet; anonymitet; ospårbarhet.; Electrical Engineering; Elektro- och systemteknik;

    Abstract : Vehicular Communication (VC) systems can greatly enhance road safety and transportation efficiency and enable a variety of applications providing traffic efficiency, environmental hazards, road conditions and infotainment. Vehicles are equipped with sensors and radars to sense their surroundings and external environment, as well as with an internal Controller Area Network (CAN) bus. READ MORE

  4. 4. Optical Document Security: Measurement, Characterization and Visualization : in the Light of Visual Evaluation

    Author : Mikael Lindstrand; Björn Kruse; Sasan Gooran; Volker Lohweg; Linköpings universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES;

    Abstract : Documents of high value, such as passports, tickets and banknotes, facilitate means for authentication. Authentication processes aim at mitigating counterfeit “passable products”. READ MORE

  5. 5. Understanding Certificate Revocation

    Author : Åsa Hagström; Robert Forchheimer; Ingemar Ingemarsson; Håkan Kvarnström; Linköpings universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Revocation; Public-key certificates; Graph transformation; Information science; Informationslära;

    Abstract : Correct certificate revocation practices are essential to each public-key infrastructure. While there exist a number of protocols to achieve revocation in PKI systems, there has been very little work on the theory behind it: Which different types of revocation can be identified? What is the intended effect of a specific revocation type to the knowledge base of each entity?As a first step towards a methodology for the development of reliable models, we present a graph-based formalism for specification and reasoning about the distribution and revocation of public keys and certificates. READ MORE