共 50 条
- [1] KeyNote: Trust management for public-key infrastructures [J]. SECURITY PROTOCOLS, 1999, 1550 : 59 - 66
- [2] On the security of a public-key cryptosystem [J]. PUBLIC-KEY CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, : 71 - 75
- [5] Self-escrowed public-key infrastructures [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC'99, 2000, 1787 : 257 - 268
- [6] A model for revocation forecasting in public-key infrastructures [J]. Knowledge and Information Systems, 2015, 43 : 311 - 331
- [7] On the security of hybrid public-key encryption [J]. ISAS/CITSA 2004: International Conference on Cybernetics and Information Technologies, Systems and Applications and 10th International Conference on Information Systems Analysis and Synthesis, Vol 1, Proceedings: COMMUNICATIONS, INFORMATION TECHNOLOGIES AND COMPUTING, 2004, : 28 - 33
- [8] On the security of the McEliece public-key cryptosystern [J]. INFORMATION, CODING AND MATHEMATICS, 2002, 687 : 141 - 163
- [9] SECURITY OF OKAMOTO PUBLIC-KEY CRYPTOSYSTEM [J]. ELECTRONICS LETTERS, 1986, 22 (20) : 1033 - 1034
- [10] Towards logically and physically secure public-key infrastructures [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS, 2002, 2551 : 122 - 134