2006
DOI: 10.1016/j.comcom.2004.12.008
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of certificate validation mechanisms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0
2

Year Published

2010
2010
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(33 citation statements)
references
References 22 publications
0
31
0
2
Order By: Relevance
“…Because the life cycle of the short-lived certificate is fixed, the verification of the short-lived certificate needs to check whether the certificate is legal, it does not need to verify whether the certificate expires [9,10]. However, the wireless X.509 certificate not only needs to verify its legitimacy but also to check whether the certificate expires, so the verification of the wireless X.509 certificate needs a more complex certificate verification scheme.…”
Section: Wpki's Certificate Verification Schemementioning
confidence: 99%
See 3 more Smart Citations
“…Because the life cycle of the short-lived certificate is fixed, the verification of the short-lived certificate needs to check whether the certificate is legal, it does not need to verify whether the certificate expires [9,10]. However, the wireless X.509 certificate not only needs to verify its legitimacy but also to check whether the certificate expires, so the verification of the wireless X.509 certificate needs a more complex certificate verification scheme.…”
Section: Wpki's Certificate Verification Schemementioning
confidence: 99%
“…Therefore, according to the works of [9,10,[12][13][14][15], we improve the certificate verification scheme based on OCSP. In this paper, our contributions are as follows:…”
Section: Our Contributionmentioning
confidence: 99%
See 2 more Smart Citations
“…The work presented in this paper is motivated by the fact that despite there are many works in the literature that propose and evaluate different mechanisms for distributing revocation data like [2], [3], [4], [5], [6], [7], little work has been done for analyzing the revocation process itself. For instance, many of the previous studies consider very simplistic assumptions about the revocation process like that the percentage of revoked certificates remains always constant.…”
Section: Introductionmentioning
confidence: 99%