메뉴 건너뛰기




Volumn 18, Issue 4, 2007, Pages 474-484

Optimal dispersal of certificate chains

Author keywords

Authentication; Certificate dispersal; Certificate graph; Public key management; Security and privacy protection; Security and protection

Indexed keywords

AUTHENTICATION; COMPUTATIONAL COMPLEXITY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY;

EID: 34047161806     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2007.1007     Document Type: Article
Times cited : (6)

References (21)
  • 2
    • 34047192001 scopus 로고    scopus 로고
    • "Optimal Dispersal of Certificate Chains"
    • Dept. of Computer Sciences, Univ. of Texas at Austin
    • E. Jung, E.S. Elmallah, and M.G. Gouda, "Optimal Dispersal of Certificate Chains," Technical Report TR06-14, Dept. of Computer Sciences, Univ. of Texas at Austin, 2006.
    • (2006) Technical Report TR06-14
    • Jung, E.1    Elmallah, E.S.2    Gouda, M.G.3
  • 4
    • 0003608554 scopus 로고    scopus 로고
    • "Internet X.509 Public Key Infrastructure Operational Protocols - LDAPv2"
    • RFC 2559
    • S. Boeyen, T. Howes, and P. Richard, "Internet X.509 Public Key Infrastructure Operational Protocols - LDAPv2," RFC 2559, 1999.
    • (1999)
    • Boeyen, S.1    Howes, T.2    Richard, P.3
  • 5
    • 0004115865 scopus 로고    scopus 로고
    • "X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP"
    • RFC 2560
    • M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams, "X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP," RFC 2560, 1999.
    • (1999)
    • Myers, M.1    Ankney, R.2    Malpani, A.3    Galperin, S.4    Adams, C.5
  • 7
    • 0004078695 scopus 로고    scopus 로고
    • "The KeyNote Trust-Management System Version 2"
    • RFC 2704
    • M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis, "The KeyNote Trust-Management System Version 2," RFC 2704, 1999.
    • (1999)
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.4
  • 11
    • 0037243196 scopus 로고    scopus 로고
    • "Distributed Credential Chain Discovery in Trust Management"
    • N. Li, W.H. Winsborough, and J.C. Mitchell, "Distributed Credential Chain Discovery in Trust Management," J. Computer Security, vol. 11, no. 1, pp. 35-86, 2003.
    • (2003) J. Computer Security , vol.11 , Issue.1 , pp. 35-86
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3
  • 12
    • 0033357103 scopus 로고    scopus 로고
    • "Securing Ad Hoc Networks"
    • Nov.-Dec
    • L. Zhou and Z.J. Haas, "Securing Ad Hoc Networks," IEEE Network, vol. 13, no. 6, pp. 24-30, Nov.-Dec. 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 15
    • 56849130276 scopus 로고    scopus 로고
    • "Vulnerability Analysis of Certificate Graphs"
    • M.G. Gouda and E. Jung, "Vulnerability Analysis of Certificate Graphs" Int'l J. Security and Networks, vol. 1, no. 1, 2006.
    • (2006) Int'l J. Security and Networks , vol.1 , Issue.1
    • Gouda, M.G.1    Jung, E.2
  • 17
    • 0032290722 scopus 로고    scopus 로고
    • "Resilient Authentication Using Path Independence"
    • Dec
    • M.K. Reiter and S.G. Stubblebine, "Resilient Authentication Using Path Independence," IEEE Trans. Computers, vol. 47, no. 12, pp. 1351-1362, Dec. 1998.
    • (1998) IEEE Trans. Computers , vol.47 , Issue.12 , pp. 1351-1362
    • Reiter, M.K.1    Stubblebine, S.G.2
  • 19
    • 0242678584 scopus 로고    scopus 로고
    • "Self-Organized Public-Key Management for Mobile Ad Hoc Networks"
    • Jan.-Mar
    • S. Capkun, L. Buttyán, and J.-P. Hubaux, "Self-Organized Public-Key Management for Mobile Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 2, no. 1, pp. 52-64, Jan.-Mar. 2003.
    • (2003) IEEE Trans. Mobile Computing , vol.2 , Issue.1 , pp. 52-64
    • Capkun, S.1    Buttyán, L.2    Hubaux, J.-P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.