![]() |
Volumn 47, Issue 8, 2004, Pages 68-74
|
Is hierarchical public-key certification the next target for hackers?
|
Author keywords
[No Author keywords available]
|
Indexed keywords
AUTHENTICATION STRUCTURES;
CERTIFICATION AUTHORITIES (CA);
ALGORITHMS;
COMPUTER CRIME;
COSTS;
DATABASE SYSTEMS;
ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS;
INTERNET;
PUBLIC KEY CRYPTOGRAPHY;
RELIABILITY;
SIGNAL RECEIVERS;
SECURITY OF DATA;
|
EID: 4243100597
PISSN: 00010782
EISSN: None
Source Type: Journal
DOI: 10.1145/1012037.1012038 Document Type: Review |
Times cited : (25)
|
References (10)
|