메뉴 건너뛰기




Volumn 2964, Issue , 2004, Pages 194-207

Improving robustness of PGP keyrings by conflict detection

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 34248346949     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24660-2_16     Document Type: Article
Times cited : (7)

References (20)
  • 4
    • 0345872645 scopus 로고    scopus 로고
    • Trust and security: A new look at the byzantine generals problem
    • Proceedings of the DIMACS Workshop on Network Threats, American Mathematical Society Publications, December
    • M. Burmester, Y. Desmedt, and G. A. Kabatianski. Trust and security: A new look at the byzantine generals problem. In Proceedings of the DIMACS Workshop on Network Threats, volume 38 of DIMACS. American Mathematical Society Publications, December 1996.
    • (1996) DIMACS , vol.38
    • Burmester, M.1    Desmedt, Y.2    Kabatianski, G.A.3
  • 9
    • 0036783876 scopus 로고    scopus 로고
    • The consensus operator for combining beliefs
    • Audun Josang. The consensus operator for combining beliefs. Artificial Intelligence, 141(1):157-170, 2002.
    • (2002) Artificial Intelligence , vol.141 , Issue.1 , pp. 157-170
    • Josang, A.1
  • 13
    • 84969363097 scopus 로고
    • A new approach to the X.509 framework: Allowing a global authentication infrastructure without a global trust model
    • San Diego, CA , USA, Feb
    • S. Mendes and C. Huitema. A new approach to the X.509 framework: Allowing a global authentication infrastructure without a global trust model. In Proceedings of the Symposium on Network and Distributed System Security, 1995, pages 172-189, San Diego, CA , USA, Feb 1995.
    • (1995) Proceedings of the Symposium on Network and Distributed System Security, 1995 , pp. 172-189
    • Mendes, S.1    Huitema, C.2
  • 16
    • 0032290722 scopus 로고    scopus 로고
    • Resilient authentication using path independence
    • December
    • M. Reiter and S. Stubblebine. Resilient authentication using path independence. IEEE Transactions on Computers, 47(12), December 1998.
    • (1998) IEEE Transactions on Computers , vol.47 , Issue.12
    • Reiter, M.1    Stubblebine, S.2
  • 18
    • 0242621248 scopus 로고
    • Associating metrics to certification paths
    • Yves Deswarte, Gérard Eizenberg, and Jean-Jacques Quisquater, editors, Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, Springer Verlag
    • Anas Tarah and Christian Huitema. Associating metrics to certification paths. In Yves Deswarte, Gérard Eizenberg, and Jean-Jacques Quisquater, editors, Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, volume 648 of Lecture Notes in Computer Science, pages 175-189. Springer Verlag, 1992.
    • (1992) Lecture Notes in Computer Science , vol.648 , pp. 175-189
    • Tarah, A.1    Huitema, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.