Public key infrastructures that satisfy security goals

被引:14
|
作者
Polk, WT [1 ]
Hastings, NE [1 ]
Malpani, A [1 ]
机构
[1] US Dept Commerce, Natl Inst Stand & Technol, Comp Secur Div, Washington, DC 20230 USA
关键词
D O I
10.1109/MIC.2003.1215661
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:60 / 67
页数:8
相关论文
共 50 条
  • [1] Using public-key infrastructures for security and risk management
    Wing, P
    O'Higgins, B
    IEEE COMMUNICATIONS MAGAZINE, 1999, 37 (09) : 71 - 73
  • [2] A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures
    Casola, Valentina
    Mazzeo, Antonino
    Mazzocca, Nicola
    Vittorini, Valeria
    JOURNAL OF COMPUTER SECURITY, 2007, 15 (02) : 197 - 229
  • [3] Deploying public key infrastructures
    Zergo Ltd
    Inf Secur Tech Rep, 2 (18-33):
  • [4] Public key infrastructures for health
    Pharow, P
    Blobel, B
    ADVANCED HEALTH TELEMATICS AND TELEMEDICINE: THE MAGDEBURG EXPERT SUMMIT TEXTBOOK, 2003, 96 : 111 - 117
  • [5] Relations among security goals of probabilistic public-key cryptosystems
    Suzuki, A
    Kaji, Y
    Watanabe, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (01): : 172 - 178
  • [6] Replacement of components in public key infrastructures
    Hartmann, M
    Maseberg, S
    IECON'01: 27TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOLS 1-3, 2001, : 2012 - 2016
  • [7] Public Key Infrastructures: A research agenda
    Price, Geraint
    JOURNAL OF COMPUTER SECURITY, 2006, 14 (05) : 391 - 417
  • [8] Trust Structure in Public Key Infrastructures
    Rahoof, P. P.
    Nair, Latha R.
    Ijyas, Thafasal V. P.
    2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC), 2017, : 223 - 227
  • [9] A quantitative study of public key infrastructures
    Bruschi, D
    Curti, A
    Rosti, E
    COMPUTERS & SECURITY, 2003, 22 (01) : 56 - 67
  • [10] Intersection of public key infrastructures and the law
    Carolina, Robert
    Lyford, Jamie
    Lyons, Tarlo
    Information Security Technical Report, 2000, 5 (04): : 39 - 52