Please use this identifier to cite or link to this item: https://idr.l1.nitk.ac.in/jspui/handle/123456789/7596
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAishwarya, C.
dc.contributor.authorRaghuram, M.A.
dc.contributor.authorHosmani, S.
dc.contributor.authorSannidhan, M.S.
dc.contributor.authorRajendran, B.
dc.contributor.authorChandrasekaran, K.
dc.contributor.authorBindhumadhava, B.S.
dc.date.accessioned2020-03-30T10:02:32Z-
dc.date.available2020-03-30T10:02:32Z-
dc.date.issued2016
dc.identifier.citationProceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015, 2016, Vol., , pp.1571-1576en_US
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/7596-
dc.description.abstractUse of TSL and certificates in secure applications in the internet is very common today. Certificate authorities are playing the important role of trust anchors. But this means that third party certificate authorities have to be trusted by both domain owners and their clients. Compromises of certificate authorities will put many users under a huge risk. To solve this problem, the DANE protocol was proposed that is used on top of DNSSEC. It allows using the chain of trust in DNS for authenticating certificates and makes clients impose many constraints on the certificates they receive. We analyze the performance of the DANE protocol at the client side and also present a tool for deploying and administrating DANE with BIND servers in a local network. � 2015 IEEE.en_US
dc.titleDANE: An inbuilt security extensionen_US
dc.typeBook chapteren_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.