Public key infrastructures that satisfy security goals

被引:14
|
作者
Polk, WT [1 ]
Hastings, NE [1 ]
Malpani, A [1 ]
机构
[1] US Dept Commerce, Natl Inst Stand & Technol, Comp Secur Div, Washington, DC 20230 USA
关键词
D O I
10.1109/MIC.2003.1215661
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:60 / 67
页数:8
相关论文
共 50 条
  • [31] Self-escrowed public-key infrastructures
    Paillier, P
    Yung, M
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC'99, 2000, 1787 : 257 - 268
  • [32] Public Key Infrastructures and Digital Certificates for the Internet of Things
    Schukat, Michael
    Cortijo, Pablo
    2015 26TH IRISH SIGNALS AND SYSTEMS CONFERENCE (ISSC), 2015,
  • [33] A model for revocation forecasting in public-key infrastructures
    Carlos Gañán
    Jorge Mata-Díaz
    Jose L. Muñoz
    Oscar Esparza
    Juanjo Alins
    Knowledge and Information Systems, 2015, 43 : 311 - 331
  • [34] Implementing public key infrastructures in a dynamic business environment
    Barber, R
    COMPUTERS & SECURITY, 2000, 19 (03) : 230 - 233
  • [35] Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infrastructures
    Matic, Srdjan
    Troncoso, Carmela
    Caballero, Juan
    24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017), 2017,
  • [36] Towards logically and physically secure public-key infrastructures
    Viswanathan, K
    Saxena, A
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS, 2002, 2551 : 122 - 134
  • [37] Why have public key infrastructures failed so far?
    Lopez, J
    Oppliger, R
    Pernul, G
    INTERNET RESEARCH, 2005, 15 (05) : 544 - 556
  • [38] An efficient scheme of merging multiple public key infrastructures in ERP
    Pan, H
    Zhu, YF
    Pan, ZY
    Lu, XL
    ADVANCES IN WEB-AGE INFORMATION MANAGEMENT, PROCEEDINGS, 2005, 3739 : 919 - 924
  • [39] Utilizing social networking platforms to support public key infrastructures
    Gruhn, Volker
    Huelder, Malte
    Wolff-Marting, Vincent
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 245 - 250
  • [40] Efficient handling of certificates within public-key infrastructures
    Faldella, E.
    Prandini, M.
    Computers and Computational Engineering in Control, 1999, : 289 - 296