Ioannis Krontiris
YOU?
Author Swipe
View article: Achieving Higher Level of Assurance in Privacy Preserving Identity Wallets
Achieving Higher Level of Assurance in Privacy Preserving Identity Wallets Open
Recent advances in decentralized digital identity based on Verifiable Credentials utilize identity wallets to ensure that the identity data control remains with the user. However, they still lack higher Level of Assurance guarantees, restr…
View article: BLINDTRUST: Oblivious Remote Attestation for Secure Service Function Chains
BLINDTRUST: Oblivious Remote Attestation for Secure Service Function Chains Open
With the rapidly evolving next-generation systems-of-systems, we face new security, resilience, and operational assurance challenges. In the face of the increasing attack landscape, it is necessary to cater to efficient mechanisms to verif…
View article: BlindTrust: Oblivious Remote Attestation for Secure Service Function Chains
BlindTrust: Oblivious Remote Attestation for Secure Service Function Chains Open
With the rapidly evolving next-generation systems- of-systems, we face new security, resilience, and operational as- surance challenges. In the face of the increasing attack landscape, it is necessary to cater to efficient mechanisms to ve…
View article: Direct anonymous attestation on the road
Direct anonymous attestation on the road Open
Vehicular networks rely on Public Key Infrastructure (PKIs) to generate long-term and short-term pseudonyms that protect vehicle’s privacy. Instead of relying on a complex and centralized ecosystem of PKI entities, a more scalable solution…
Autonomous Vehicles: Data Protection and Ethical Considerations Open
peer reviewed
Securing V2X Communications for the Future Open
Over recent years, emphasis in secure V2X communications research has converged on the use of Vehicular Public Key Infrastructures (VPKIs) for credential management and privacy-friendly authentication services. However, despite the securit…