Potential identity resolution systems for the industrial Internet of Things: A survey

Y Ren, R **e, FR Yu, T Huang… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
In recent years, the Industrial Internet of Things (IIoT) came into being. IIoT connects
sensors, industrial equipment, products, and staff in the factory, enabling context-awareness …

Thirty years of DNS insecurity: Current issues and perspectives

G Schmid - IEEE Communications Surveys & Tutorials, 2021 - ieeexplore.ieee.org
When DNS was created, nobody expected that it would have become the base for the digital
economy and a prime target for cybercriminals. And nobody expected that one main asset of …

SoK: secure messaging

N Unger, S Dechand, J Bonneau, S Fahl… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Motivated by recent revelations of widespread state surveillance of personal communication,
many solutions now claim to offer secure and private messaging. This includes both a large …

Systematizing decentralization and privacy: Lessons from 15 years of research and deployments

C Troncoso, M Isaakidis, G Danezis… - arxiv preprint arxiv …, 2017 - arxiv.org
Decentralized systems are a subset of distributed systems where multiple authorities control
different components and no authority is fully trusted by all. This implies that any component …

Internet Identifiers: A Survey of History, Challenges, and Future Perspectives

A Babakian, G Huston, R Braun, J Lipman - IEEE Access, 2024 - ieeexplore.ieee.org
Identity systems are fundamental to any network, just as a language is shaped by a
consistent set of symbols and their interpretation. A network is defined by a consistent set of …

In encryption we don't trust: The effect of end-to-end encryption to the masses on user perception

S Dechand, A Naiakshina, A Danilova… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
With WhatsApp's adoption of the Signal Protocol as its default, end-to-end encryption by the
masses happened almost overnight. Unlike iMessage, WhatsApp notifies users that …

Deniable key exchanges for secure messaging

N Unger, I Goldberg - Proceedings of the 22nd acm sigsac conference …, 2015 - dl.acm.org
In the wake of recent revelations of mass government surveillance, secure messaging
protocols have come under renewed scrutiny. A widespread weakness of existing solutions …

reclaimID: Secure, self-sovereign identities using name systems and attribute-based encryption

M Schanzenbach, G Bramm… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
In this paper we present reclaimID: An architecture that allows users to reclaim their digital
identities by securely sharing identity attributes without the need for a centralised service …

Unravelling ariadne's thread: Exploring the threats of decentralised dns

C Patsakis, F Casino, N Lykousas, V Katos - IEEE Access, 2020 - ieeexplore.ieee.org
The current landscape of the core Internet technologies shows considerable centralisation
with the big tech companies controlling the vast majority of traffic and services. This situation …

ZKlaims: Privacy-preserving attribute-based credentials using non-interactive zero-knowledge techniques

M Schanzenbach, T Kilian, J Schütte… - arxiv preprint arxiv …, 2019 - arxiv.org
In this paper we present ZKlaims: a system that allows users to present attribute-based
credentials in a privacy-preserving way. We achieve a zero-knowledge property on the basis …