Please use this identifier to cite or link to this item:
https://idr.l2.nitk.ac.in/jspui/handle/123456789/7596
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Aishwarya, C. | |
dc.contributor.author | Raghuram, M.A. | |
dc.contributor.author | Hosmani, S. | |
dc.contributor.author | Sannidhan, M.S. | |
dc.contributor.author | Rajendran, B. | |
dc.contributor.author | Chandrasekaran, K. | |
dc.contributor.author | Bindhumadhava, B.S. | |
dc.date.accessioned | 2020-03-30T10:02:32Z | - |
dc.date.available | 2020-03-30T10:02:32Z | - |
dc.date.issued | 2016 | |
dc.identifier.citation | Proceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015, 2016, Vol., , pp.1571-1576 | en_US |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/7596 | - |
dc.description.abstract | Use of TSL and certificates in secure applications in the internet is very common today. Certificate authorities are playing the important role of trust anchors. But this means that third party certificate authorities have to be trusted by both domain owners and their clients. Compromises of certificate authorities will put many users under a huge risk. To solve this problem, the DANE protocol was proposed that is used on top of DNSSEC. It allows using the chain of trust in DNS for authenticating certificates and makes clients impose many constraints on the certificates they receive. We analyze the performance of the DANE protocol at the client side and also present a tool for deploying and administrating DANE with BIND servers in a local network. � 2015 IEEE. | en_US |
dc.title | DANE: An inbuilt security extension | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.