메뉴 건너뛰기




Volumn 3225, Issue , 2004, Pages 292-303

Certificate recommendations to improve the robustness of web of trust

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; SECURITY OF DATA;

EID: 35048873384     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30144-8_25     Document Type: Article
Times cited : (3)

References (27)
  • 2
    • 0031641091 scopus 로고    scopus 로고
    • On the structure of delegation networks
    • Rockport, MA, June 1998. IEEE Computer Society Press
    • Tuomas Aura. On the structure of delegation networks. In Proc. 11th IEEE Computer Security Foundations Workshop, pages 14-26, Rockport, MA, June 1998. IEEE Computer Society Press.
    • Proc. 11th IEEE Computer Security Foundations Workshop , pp. 14-26
    • Aura, T.1
  • 3
    • 20744437968 scopus 로고    scopus 로고
    • Pushdown-reduce: An algorithm for connectivity augmentation and poset covering problems
    • András A. Benczúr. Pushdown-reduce: an algorithm for connectivity augmentation and poset covering problems. Discrete Applied Mathematics, 129(2-3):233-262, 2003.
    • (2003) Discrete Applied Mathematics , vol.129 , Issue.2-3 , pp. 233-262
    • Benczúr, A.A.1
  • 11
    • 29444436479 scopus 로고    scopus 로고
    • Directed vertex-connectivity augmentation
    • Andras Frank and Tibor Jordan. Directed vertex-connectivity augmentation. Mathematical Programming, 84(3):537-553, 1999.
    • (1999) Mathematical Programming , vol.84 , Issue.3 , pp. 537-553
    • Frank, A.1    Jordan, T.2
  • 12
    • 0003780715 scopus 로고
    • Addison-Wesley, Reading, Mass.
    • Frank Harary. Graph Theory. Addison-Wesley, Reading, Mass., 1969.
    • (1969) Graph Theory
    • Harary, F.1
  • 13
    • 35048841438 scopus 로고    scopus 로고
    • Certificate recommendations to improve robustness of webs of trust
    • Department of Computer Science, N.C. State University, January
    • Qinglin Jiang, Douglas S. Reeves, and Peng Ning. Certificate recommendations to improve robustness of webs of trust. Technical Report TR-2004-04, Department of Computer Science, N.C. State University, January 2004.
    • (2004) Technical Report TR-2004-04
    • Jiang, Q.1    Reeves, D.S.2    Ning, P.3
  • 18
    • 84969363097 scopus 로고
    • A new approach to the X.509 framework: Allowing a global authentication infrastructure without a global trust model
    • San Diego, CA , USA, Feb 1995.
    • S. Mendes and C. Huitema. A new approach to the X.509 framework: Allowing a global authentication infrastructure without a global trust model. In Proceedings of the Symposium on Network and Distributed System Security, 1995, pages 172-189, San Diego, CA , USA, Feb 1995.
    • (1995) Proceedings of the Symposium on Network and Distributed System Security , pp. 172-189
    • Mendes, S.1    Huitema, C.2
  • 19
    • 51249185617 scopus 로고
    • The ellipsoid method and its consequences in combinatorial optimization
    • M.Grotschel, L.Lovasz, and A.Schrijver. The ellipsoid method and its consequences in combinatorial optimization. Combinatorial, 1:169 -197, 1981.
    • (1981) Combinatorial , vol.1 , pp. 169-197
    • Grotschel, M.1    Lovasz, L.2    Schrijver, A.3
  • 20
    • 84867958844 scopus 로고    scopus 로고
    • Graph connectivity and its augmentation: Applications of ma orderings
    • Hiroshi Nagamochi and Toshihide Ibaraki. Graph connectivity and its augmentation: applications of ma orderings. Discrete Appl. Math., 123(1-3):447-472, 2002.
    • (2002) Discrete Appl. Math. , vol.123 , Issue.1-3 , pp. 447-472
    • Nagamochi, H.1    Ibaraki, T.2
  • 22
    • 0032290722 scopus 로고    scopus 로고
    • Resilient authentication using path independence
    • December
    • M. Reiter and S. Stubblebine. Resilient authentication using path independence. IEEE Transactions on Computers, 47(12), December 1998.
    • (1998) IEEE Transactions on Computers , vol.47 , Issue.12
    • Reiter, M.1    Stubblebine, S.2
  • 24
    • 0242621248 scopus 로고
    • Associating metrics to certification paths
    • France, November 23-25, 1992, Proceedings, volume 648 of Lecture Notes in Computer Science, Springer Verlag
    • Anas Tarah and Christian Huitema. Associating metrics to certification paths. In Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, volume 648 of Lecture Notes in Computer Science, pages 175-189. Springer Verlag, 1992.
    • (1992) Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse , pp. 175-189
    • Tarah, A.1    Huitema, C.2
  • 25
    • 35048899030 scopus 로고    scopus 로고
    • Int'l Telecommunications Union/ITU Telegraph & Tel. ITU-T recommendation X.509: The directory: Public-key and attribute certificate frameworks, Mar 2000.
    • Int'l Telecommunications Union/ITU Telegraph & Tel. ITU-T recommendation X.509: The directory: Public-key and attribute certificate frameworks, Mar 2000.
  • 26
    • 0032482432 scopus 로고    scopus 로고
    • Collective dynamics of small-world networks
    • D. Watts and S. Strogatz. Collective dynamics of small-world networks. Nature, 393:440, 1998.
    • (1998) Nature , vol.393 , pp. 440
    • Watts, D.1    Strogatz, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.