Journal of Information Security

Volume 6, Issue 1 (January 2015)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

Public Key Infrastructure: A Survey

HTML  XML Download Download as PDF (Size: 2684KB)  PP. 31-37  
DOI: 10.4236/jis.2015.61004    5,735 Downloads   10,391 Views  Citations

ABSTRACT

As security is essential in communications through electronic networks, development of structures providing high levels of security is needed. Public Key Infrastructure (PKI) is a way of providing security measures by implementing the means of key pairs among users. In this paper, an overview of the public key infrastructure is discussed that includes various components and operation, some well known PKIs and their comparisons. Also we discuss current implementations, risk and challenges of PKIs.

Share and Cite:

Albarqi, A. , Alzaid, E. , Ghamdi, F. , Asiri, S. and Kar, J. (2015) Public Key Infrastructure: A Survey. Journal of Information Security, 6, 31-37. doi: 10.4236/jis.2015.61004.

Cited by

[1] OpenFL: the open federated learning library
Physics in Medicine …, 2022
[2] Efficient and Automatic Pseudonym Management Scheme for VANET with Blockchain
International Conference on Frontiers in Cyber …, 2022
[3] Critically Examine the Readiness of Tonga's Legislative Framework for e-Crimes
2022
[4] Analysis of Cybersecurity for the Enterprise
2022
[5] Trustworthy Internet Based on Generalized Blockchain
… on Blockchain Technology and Information Security …, 2022
[6] Métodos de autenticação considerando aspectos de segurança, privacidade e experiência de uso: a visão dos usuários finais
2022
[7] Protocolo ACME pós-quântico
2022
[8] Vergleich von CI/CD und GitOps im DevOps-Kontext
2022
[9] Firma digital con token para aplicaciones web
2021
[10] Improved Content Finding in Named Data Networking
2021
[11] A Novel Framework for Efficient Multiple Signature on Certificate with Database Security
2021
[12] Phishing Attacks Detection A Machine Learning-Based Approach
2021 IEEE 12th Annual …, 2021
[13] An edge assisted secure lightweight authentication technique for safe communication on the Internet of drones network
2021
[14] Mutual Authentication Protocol for Secure VANET Data Exchanges
2021
[15] NATIONAL E-SIGNATURE INFRASTRUCTURE: CURRENT PROBLEMS OF SCIENTIFIC RESEARCH
2021
[16] An appraisal of electronic signature law of Ethiopia: further reforms for improvement
2021
[17] A Metric for Evaluating Security Models based on Implementation of Public Key Infrastructure
2020
[18] On password-based authenticated key exchange (PAKE) protocols.
2020
[19] MySmartPi
2020
[20] Blockchain Based Efficient Peer to Peer Authentication Model for Security and Privacy Challenges of Internet of Things (IoT)
International Journal of Computer Science and Telecommunications, 2020
[21] Hash-Chain-Based Cross-Regional Safety Authentication for Space-Air-Ground Integrated VANETs
2020
[22] Distributed, Secure, Self-Sovereign Identity for IoT Devices
2020
[23] An Efficient Decentralized Key Management Mechanism for VANET with Blockchain
2020
[24] ON PASSWORD-BASED AUTHENTICATED KEY EXCHANGE (PAKE) PROTOCOLS
2020
[25] Implementación del módulo de firmas digitales para el sistema integrado de actividad docente (SIAD) de la carrera de software de la Universidad Técnica del Norte …
2020
[26] MİLLİ E-İMZA İNFRASTRUKTURU: AKTUAL ELMİ-PRAKTİKİ PROBLEMLƏR
2020
[27] Uma abordagem para auto identificação voluntária e verificável de participantes de aplicações baseadas em livros-razão distribuídos
2020
[28] An TPM Based Approach for Generation of Secret Key.
2019
[29] A Review on “Impact of Large Infrastructure Project on Local Economy”
2019
[30] A Review on Impact of Large Infrastructure Project on Local Economy
2019
[31] ИСПОЛЬЗОВАНИЕ ТЕХНОЛОГИИ БЛОКЧЕЙН ПРИ РАЗРАБОТКЕ ПРИЛОЖЕНИЯ ДЛЯ ВЕРИФИКАЦИИ ТОВАРОВ
Вестник Казахской академии …, 2019
[32] An TPM Based Approach for Generation of Secret Key
2019
[33] Análisis de la firma digital con base en la infraestructura de clave pública.[Analysis of digital signature based on the public key infrastructure]. Hamutay, 5 (2), 89 …
EDITORIAL BOARD, 2018
[34] Enhancements E-mail Security using PGP Technology
2018
[35] Using Record Level Encryption for Securing Information in Classified Information Systems
Natural and Engineering Sciences, 2018
[36] Análisis de la firma digital con base en la infraestructura de clave pública (Analysis of digital signature based on public key infrastructure)
2018
[37] Análisis de la firma digital con base en la infraestructura de clave pública
2018
[38] Análisis de la firma digital con base en la infraestructura de clave
Revista semestral de divulgación científica, 2018
[39] Facultad de Ingeniería en Ciencias Aplicadas Carrera de Ingeniería en Sistemas Computacionales
2018
[40] Efficient Approaches to Ensure Certificate Authenticity for Public Key Infrastructure
2017
[41] A Secure IoT Data Integration in Cloud Storage Systems using ABAC Access Control Policy
International Journal of Advanced Engineering Research and Science, 2017
[42] A reliable and secure approach for efficient Car-to-Car communication in intelligent transportation systems
2017
[43] Generation and verification of digital signature with two factor authentication
2016
[44] An efficient privacy protection solution for smart home application platform
2016
[45] Data Sharing and Consent Management of Electronic Health Record based on the Blockchain Technology

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.