The Experts below are selected from a list of 18 Experts worldwide ranked by ideXlab platform
Eman Sayed - One of the best experts on this subject based on the ideXlab platform.
-
blockchain solutions in education a new cross education blockchain based framework
Proceedings of the 2020 9th International Conference on Software and Information Engineering (ICSIE), 2020Co-Authors: Eman SayedAbstract:Variant blockchain-based solutions were proposed during the last 5 years for education. This paper is the first to discuss these solutions and their usage and benefits. However, there is not yet any solution in the literature that issues or validates a Certificate which includes courses from different educational institutes. This paper proposes a novel framework for cross-education blockchain-based solution. It collects participating institutes in one blockchain network. Graduates of this solution can join courses in the institutes that provide the latest and strongest contents. The Issued Certificate is self-validating for all the courses that are obtained from multiple institutes. It is cryptographically coded and securely stored using the blockchain technology. It can be validated instantaneously through one validation portal independently without contacting its issuing institutes. The saved time and resources are oriented toward enhancing students' services. This framework can be extended to fields that require issuing or validating cross-acquired Certificates.
Gong Yi-dong - One of the best experts on this subject based on the ideXlab platform.
-
Key agreement with authenticated between trusted nodes based on self-Issued Certificate in WSN
Fifth International Conference on Computing Communications and Networking Technologies (ICCCNT), 2014Co-Authors: Gong Yi-dongAbstract:Wireless sensor networks are usually deployed in harsh environment or a hostile environment, vulnerable to various attacks. A key agreement scheme is proposed in order to solving the problem that traditional key system can not withstand attacks from internal node captured. The way of judgment node credibility is to calculate the trust value by establishing node communication behavior reputation model. Trusted neighbors exchange public key Certificate by the base station to generate and signed. A new authenticated key agreement is designed based on each other's Identity information and public key Certificates, combined with the elliptic curve cryptosystem. The program can resist the malicious behavior of the internal and external nodes effectively, make network security and survivability enhance significantly compared with other programs, make the network have good scalability, and ensure the key forward security and backward security.
Haijiao Wang - One of the best experts on this subject based on the ideXlab platform.
-
An Improved Delta and Over-Issued Certificate Revocation Mechanism
2008 ISECS International Colloquium on Computing Communication Control and Management, 2008Co-Authors: Shaomin Zhang, Haijiao WangAbstract:With the increasing acceptance of digital Certificates, how to find and revoke digital Certificate which has been stopped has been become more and more important, which can avoid huge economic losses to end-user. At present the most popular choice is the use of lightweight directory access protocol (LDAP) directory server to issue the Certificate revocation list (CRL). Based on the analysis of the Certificate storage and publish in LDAP server, a new and more efficient Certificate revocation mechanism is proposed in this paper. The new mechanism integrates Delta and over-Issued CRL and windowed Certificate revocation mechanism, which satisfies the scalability and flexibility requirements of Certificate revocation mechanism, at the same time, and can provide near real-time Certificate status when required. The design and performance of the new mechanism are analyzed in detail. CRL is organized in the form of binary sort tree structure in LDAP, which satisfies the query of the revocation of Certificates rapidly in LDAP.
Spalazzi Luca - One of the best experts on this subject based on the ideXlab platform.
-
Security analysis of a blockchain-based protocol for the certification of academic credentials
2019Co-Authors: Baldi Marco, Chiaraluce Franco, Kodra Migelan, Spalazzi LucaAbstract:We consider a blockchain-based protocol for the certification of academic credentials named Blockcerts, which is currently used worldwide for validating digital Certificates of competence compliant with the Open Badges standard. We study the certification steps that are performed by the Blockcerts protocol to validate a Certificate, and find that they are vulnerable to a certain type of impersonation attacks. More in detail, authentication of the issuing institution is performed by retrieving an unauthenticated issuer profile online, and comparing some data reported there with those included in the Issued Certificate. We show that, by fabricating a fake issuer profile and generating a suitably altered Certificate, an attacker is able to impersonate a legitimate issuer and can produce Certificates that cannot be distinguished from originals by the Blockcerts validation procedure. We also propose some possible countermeasures against an attack of this type, which require the use of a classic public key infrastructure or a decentralized identity system integrated with the Blockcerts protocol.Comment: 12 pages, 14 figure
Shaomin Zhang - One of the best experts on this subject based on the ideXlab platform.
-
An Improved Delta and Over-Issued Certificate Revocation Mechanism
2008 ISECS International Colloquium on Computing Communication Control and Management, 2008Co-Authors: Shaomin Zhang, Haijiao WangAbstract:With the increasing acceptance of digital Certificates, how to find and revoke digital Certificate which has been stopped has been become more and more important, which can avoid huge economic losses to end-user. At present the most popular choice is the use of lightweight directory access protocol (LDAP) directory server to issue the Certificate revocation list (CRL). Based on the analysis of the Certificate storage and publish in LDAP server, a new and more efficient Certificate revocation mechanism is proposed in this paper. The new mechanism integrates Delta and over-Issued CRL and windowed Certificate revocation mechanism, which satisfies the scalability and flexibility requirements of Certificate revocation mechanism, at the same time, and can provide near real-time Certificate status when required. The design and performance of the new mechanism are analyzed in detail. CRL is organized in the form of binary sort tree structure in LDAP, which satisfies the query of the revocation of Certificates rapidly in LDAP.