2008 Third International Conference on Availability, Reliability and Security 2008
DOI: 10.1109/ares.2008.101
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Certificate Path Validation and Its Application in Mobile Payment Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2009
2009
2015
2015

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 12 publications
0
3
0
1
Order By: Relevance
“…The cryptographic operations computed during the WTLS protocol are not considered in this evaluation. We suggest to readers review related works [36,41,[44][45][46][47][48]. Table 3 shows the number and size of messages exchanged by each participant during the different phases.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…The cryptographic operations computed during the WTLS protocol are not considered in this evaluation. We suggest to readers review related works [36,41,[44][45][46][47][48]. Table 3 shows the number and size of messages exchanged by each participant during the different phases.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Based on previous research [36,41,42], we design a WPKI in where the mobile devices require low computational power to perform the mutual-authentication process using WTLS. Figure 1 describes the structure of the WPKI.…”
Section: Wireless Public Key Infrastructure (Wpki)mentioning
confidence: 99%
“…The amount of protection data is proportional to the length of a certification path [Martinez-Pel et al 2008]. In that sense, Nested Certificates [Levi et al 2004] address Problem 2 by reducing certification paths.…”
Section: Related Workmentioning
confidence: 99%
“…Em resumo, é evidente que a validac ¸ão do caminho de certificac ¸ão é um procedimento complexo cujo esforc ¸o computacional envolvido é intensificado pela presenc ¸a de esquemas de revogac ¸ão, além de ser proporcional ao comprimento do caminho de certificac ¸ão [Martinez-Peláez et al 2008]. Conclui-se, então, que o caminho de certificac ¸ão ideal deveria ser livre de revogac ¸ão de certificados e o mais curto possível -por exemplo, uma ICP hierárquica em que a AC Raiz emite certificados para usuários finais.…”
Section: Validac ¸ãO De Assinaturaunclassified