Citations
The paper
has been cited by the following works.
- Agapios Platis, Costas
Lambrinoudakis, and Assimakis Leros.
Public a probabilistic model for evaluating the operational cost of PKI-based
financial transactions.
In Sokratis K. Katsikas, Stefanos Gritzalis, and Javier Lopez, editors,
Public Key Infrastructure: First European PKI Workshop: Research and
Applications, EuroPKI 2004, pages 149–159. Springer-Verlag, June
2004.
Lecture Notes in Computer Science 3093.
- J.L. Muñoz,
J. Forné, O. Esparza, and M. Rey.
Efficient certificate revocation system implementation: Huffman Merkle hash
tree (HuffMHT).
In 2nd International Conference on Trust, Privacy, and Security in
Digital Business (TrustBus/05), pages 119–127. Springer Verlag, 2005.
LNCS 3592.
- A. Lioy, M. Marian,
N. Moltchanova, and M. Pala.
PKI past, present and future.
International Journal of Information Security, 5(1):18–29, 2006.
(doi:10.1007/s10207-005-0077-9)
- T. Perlines Hormann, K. Wrona, and S. Holtmanns.
Evaluation of certificate validation mechanisms.
Computer Communications, 29(3):291–305, 2006.
(doi:10.1016/j.comcom.2004.12.008)
- Gabriel Vanrenen,
Sean Smith, and John Marchesini.
Distributing security-mediated PKI.
International Journal of Information Security, 5(1):3–17, January
2006.
(doi:10.1007/s10207-005-0076-x)
- M. Zhao and S.W.
Smith.
Modeling
and evaluation of certification path discovery in the emerging global
PKI.
In Andrea S. Atzeni and Antonio Lioy, editors, Public Key Infrastructure,
Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy,
June 19-20, 2006, Proceedings, pages 16–30. Springer-Verlag, 2006.
Lecture Notes in Computer Science 4043.
- K. Papapanagiotou, G.F. Marias, and P. Georgiadis.
A certificate validation protocol for VANETs.
In GLOBECOM: IEEE Global Telecommunications Conference, 2007.
(doi:10.1109/GLOCOMW.2007.4437825)
- J.L. Muñoz,
O. Esparza, J. Forné, and E. Pallares.
H-OCSP: A protocol to reduce the processing burden in online certificate
status validation.
Electronic Commerce Research, 8(4):255–273, 2008.
(doi:10.1007/s10660-008-9024-y)
- J.A. Solworth.
Instant revocation.
In Public Key Infrastructure: 5th European PKI Workshop: Theory and
Practice, EuroPKI 2008, pages 31–48, 2008.
Lecture Notes in Computer Science 5057.
(doi:10.1007/978-3-540-69485-4_3)
- H. Zhou, P. Luo, D. Wang,
and Y. Dai.
Fast public key infrastructure authentication based on ca caching.
Qinghua Daxue Xuebao/Journal of Tsinghua University,
48(7):1160–1164, 2008.
- J.L. Muñoz,
O. Esparza, J. Forné, and E. Pallares.
Design and implementation of a lightweight online certificate validation
service.
Telecommunication Systems, 41(3):229–241, 2009.
(doi:10.1007/s11235-009-9144-2)
- G. López Millán, M. Gil Pérez,
G. Martınez Pérez, and A.F. Gómez Skarmeta.
PKI-based trust management in inter-domain scenarios.
Computers and Security, 29(2):278–290, 2010.
(doi:10.1016/j.cose.2009.08.004)
- K. Papapanagiotou, G.F. Marias, and P. Georgiadis.
Revising centralized certificate validation standards for mobile and wireless
communications.
Computer Standards and Interfaces, 32(5-6):281–287, 2010.
(doi:10.1016/j.csi.2009.07.001)
- M. Ingle and M. Kumar.
Push technique based certificate revocation model for mobile devices.
In Proceedings - 2011 International Conference on Computational
Intelligence and Communication Systems, CICN 2011, pages 635–638,
2011.
(doi:10.1109/CICN.2011.138)
- A.N. Platis and V.P.
Koutras.
Software rejuvenation on a PKI.
In Proceedings - International Symposium on Software Reliability
Engineering, ISSRE, 2011.
(doi:10.1109/WOSAR.2010.5722102)
- Sufatrio and R.H.C.
Yap.
Trusted principal-hosted certificate revocation.
IFIP Advances in Information and Communication Technology, 358
AICT:173–189, 2011.
(doi:10.1007/978-3-642-22200-9_15)
- Sufatrio and R.H.C.
Yap.
Quantifying the effects of more timely certificate revocation on lightweight
mobile devices.
In Proceedings - 2011 3rd International Workshop on Security Measurements
and Metrics, Metrisec 2011, pages 31–40, 2012.
(doi:10.1109/Metrisec.2011.17)
- K. Raja,
A. Deivasigamani, and V. Ravi.
A reliant certificate revocation of malicious nodes in MANETs.
Wireless Personal Communications, 90(2):435–455, 2016.
(doi:10.1007/s11277-015-3016-8)
- P. Szalachowski,
L. Chuat, and A. Perrig.
PKI safety net (PKISN): Addressing the too-big-to-be-revoked problem of
the TLS ecosystem.
In 1st IEEE European Symposium on Security and Privacy, EURO S and P
2016, pages 407–422. Institute of Electrical and Electronics
Engineers Inc., 2016.
(doi:10.1109/EuroSP.2016.38)
Home
Unless otherwise expressly stated, all original material on this page created by Diomidis Spinellis is licensed under a Creative Commons Attribution-Share Alike 3.0 Greece License.