Trusted Mobile Interaction via Extended Digital Certificates

Author(s):  
Will Tao ◽  
Robert Steele
2011 ◽  
Author(s):  
Sean T. Hayes ◽  
Eli R. Hooten ◽  
Julie A. Adams

2017 ◽  
Vol 8 (1) ◽  
pp. 1-10
Author(s):  
Is Mardianto ◽  
Kuswandi Kuswandi

Security issues have become a major issue on the Internet. One of the security methods that are widely used today is to implement a digital certificate. Digital certificates have evolved over time, one of which is the X.509 digital certificate. Digital certificates have been widely used as authentication applications, web network authentication and other authentication systems that require digital certificates. This research is carried out by implementing an X.509 digital certificate technology as a mobile web service with its client. Secure Hash Algorithm (SHA), Diffie-Hellman, and Advanced Encryption Standard (AES) are used to secure the data exchange transaction between the web service and mobile phone. SHA algorithm will be used for user authentication, Diffie-Hellman algorithm will be used for public key exchange and AES algorithms will be used for symmetric cryptography data. The results of the application of digital certificates, the SHA algorithm, Diffie-Hellman, and AES in mobile phone applications, provide security application running on web service. Index Terms—Digital Certificate, X.509, SHA, Diffie Hellman, AES


2017 ◽  
Vol 1 (8) ◽  
Author(s):  
Cristian Fernando Cedeño Sarmiento ◽  
Alex Gregorio Mendoza Arteaga ◽  
Gregorio Isoldo Mendoza Cedeño ◽  
Enrique Javier Macías Arias

En el presente artículo se realiza un análisis de la usabilidad del Documento Nacional de Identidad electrónico en países desarrollados y su futura implementación en el Ecuador, la necesidad de tener un documento de identificación electrónico legal que permita validar la identidad de los ciudadanos al momento de acceder a los servicios electrónicos públicos y privados. Se analizan conceptos referentes a la firma electrónica, las entidades que intervienen en el proceso, los mecanismos de encriptación de un mensaje, hasta culminar con la implementación de dicha firma electrónica. Finalmente, se hace una reflexión sobre la implementación de un nuevo documento de identidad en el Ecuador el cual debería contener las características necesarias acorde a las nuevas tecnologías existentes, los estándares internacionales y sus posibles usos en los servicios informáticos disponibles en el país.  Palabras clave: Encriptación, tecnologías, servicios informáticos, identificación electrónica   Applications of electronic signatures using digital certificates: The National Electronic Identity in Ecuador   Aplicaciones electrónicas en Ecuador    Abstract  In the present article itself performs an analysis of the usability of the National Electronic Identity Document in developed countries and its future implementation in Ecuador, the need for a legal electronic identification document to validate the identity of citizens at time by accessing the electronic government and corporate services. Discusses concepts related to electronic signatures, the entities involved in the process, the mechanisms for the encryption a message, culminating with the implementation of electronic signatures. Finally, a reflection on the implementation of a new identity in Ecuador that should contain the necessary characteristics according to the new existing technologies, international standards and their possible uses and computer services available in the country. Keywords: Encriptación, tecnologías, servicios informáticos, identificación electrónica


2021 ◽  
Vol 13 (5) ◽  
pp. 2549
Author(s):  
Shahid Mahmood ◽  
Moneeb Gohar ◽  
Jin-Ghoo Choi ◽  
Seok-Joo Koh ◽  
Hani Alquhayz ◽  
...  

Smart Grid (SG) infrastructure is an energy network connected with computer networks for communication over the internet and intranets. The revolution of SGs has also introduced new avenues of security threats. Although Digital Certificates provide countermeasures, however, one of the issues that exist, is how to efficiently distribute certificate revocation information among Edge devices. The conventional mechanisms, including certificate revocation list (CRL) and online certificate status protocol (OCSP), are subjected to some limitations in energy efficient environments like SG infrastructure. To address the aforementioned challenges, this paper proposes a scheme incorporating the advantages and strengths of the fog computing. The fog node can be used for this purpose with much better resources closer to the edge. Keeping the resources closer to the edge strengthen the security aspect of smart grid networks. Similarly, a fog node can act as an intermediate Certification Authority (CA) (i.e., Fog Node as an Intermediate Certification Authority (FONICA)). Further, the proposed scheme has reduced storage, communication, processing overhead, and latency for certificate verification at edge devices. Furthermore, the proposed scheme reduces the attack surface, even if the attacker becomes a part of the network.


Symmetry ◽  
2021 ◽  
Vol 13 (3) ◽  
pp. 395
Author(s):  
Chien-Hsiung Chen ◽  
Miao Huang

This study investigated the impacts of different notification modalities used in low and high ambient sound environments for mobile phone interaction. Three different notification modalities—Shaking Visual, Shaking Visual + Vibration, and Vibration—were designed and experimentally tested by asking users to conduct a maze task. A total of 72 participants were invited to take part in the experiment through the convenience sampling method. The generated results indicated that (1) the notification modality affects participants’ task completion time, (2) the error rate pertinent to the number of notifications is positively related to the participants’ task completion time, and (3) the ambient sound level and notification modalities impact the overall experience of the participants. The main contributions of this study are twofold. First, it verifies that the multi-dimensional feature of a Shaking Visual + Vibration synesthesia notification design is implementable. Second, this study demonstrated that the synesthesia notification could be feasible for mobile notification, and it was more perceptible by the users.


Author(s):  
Ronald Martinez ◽  
Alain Alejo ◽  
Paulo Portugal ◽  
Alvaro Cuno ◽  
Fernando Zapata ◽  
...  
Keyword(s):  

Author(s):  
Francesco Cutugno ◽  
Vincenza Anna Leano ◽  
Roberto Rinaldi ◽  
Gianluca Mignini
Keyword(s):  

2002 ◽  
Vol 6 (4) ◽  
pp. 282-289 ◽  
Author(s):  
Jörg Roth
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document