-
1
-
-
21244466307
-
New approaches to digital evidence
-
Maurer, U. (2004). New approaches to digital evidence. Proceedings of the IEEE, 92 (6), 933-947.
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 933-947
-
-
Maurer, U.1
-
2
-
-
77954887618
-
-
The World Internet Security Company, Last accessed 16th August 2008
-
The World Internet Security Company (2008). http://www1.wisekey.com/ products/. Last accessed 16th August (2008).
-
(2008)
-
-
-
3
-
-
77954887063
-
-
The Controller of Certifying Authority, Last accessed 21st August 2008
-
The Controller of Certifying Authority (2008). http://www.cca.gov.in. Last accessed 21st August (2008).
-
(2008)
-
-
-
4
-
-
77954888199
-
-
The National Informatics Centre, Certifying Authority, Last accessed 21st August 2008
-
The National Informatics Centre (2008). Certifying Authority, http://nicca.nic.in/index.jsp. Last accessed 21st August (2008).
-
(2008)
-
-
-
5
-
-
77954888069
-
-
The Tata Consultancy Services, Certifying Authority, Last accessed 21st August 2008
-
The Tata Consultancy Services (2008). Certifying Authority, http://www.tcs-ca.tcs.co.in. Last accessed 21st August (2008).
-
(2008)
-
-
-
6
-
-
27644512043
-
An efficient key distribution scheme with self-healing property
-
Hong, D., & Kang, J. (2005). An efficient key distribution scheme with self-healing property. IEEE Communications Letters, 9 (8), 759-761.
-
(2005)
IEEE Communications Letters
, vol.9
, Issue.8
, pp. 759-761
-
-
Hong, D.1
Kang, J.2
-
8
-
-
3242880752
-
Digital certificates: A survey of revocation methods
-
Los Angeles, California, United States
-
Wohlmacher, P. (2000). Digital certificates: a survey of revocation methods. In Proceedings of the 2000 ACM workshops on multimedia 2000 (pp. 111-114). Los Angeles, California, United States.
-
(2000)
Proceedings of the 2000 ACM Workshops on Multimedia 2000
, pp. 111-114
-
-
Wohlmacher, P.1
-
10
-
-
33645797144
-
Tradeoffs in certificate revocation schemes
-
Zheng, P. (2003). Tradeoffs in certificate revocation schemes. ACM SIGCOMM Computer Communication Review, 33 (2), 103-112.
-
(2003)
ACM SIGCOMM Computer Communication Review
, vol.33
, Issue.2
, pp. 103112
-
-
Zheng, P.1
-
12
-
-
34648846428
-
Revocation-free publickey encryption based on security-mediated public-key infrastructure
-
Lo, C. M., Hwang, T., & Li, C. M. (2007). Revocation-free publickey encryption based on security-mediated public-key infrastructure. IET Information Security, 1 (3), 134-141.
-
(2007)
IET Information Security
, vol.1
, Issue.3
, pp. 134-141
-
-
Lo, C.M.1
Hwang, T.2
Li, C.M.3
-
13
-
-
85084163661
-
A method for fast revocation of public key certificates and security capabilities
-
Boneh, D., Ding, X., Tsudik, G., & Wong, M. (2001). A method for fast revocation of public key certificates and security capabilities. In Proc. 10th USENIX security symposium (pp. 297-308).
-
(2001)
Proc. 10th USENIX Security Symposium
, pp. 297-308
-
-
Boneh, D.1
Ding, X.2
Tsudik, G.3
Wong, M.4
-
15
-
-
35248866223
-
Certificate-based encryption and the certificate revocation problem
-
Berlin: Springer
-
Gentry, C. (2003). Certificate-based encryption and the certificate revocation problem. In LNCS: Vol. 2656. Proc. Eurocrypt 2003 (pp. 272-293). Berlin: Springer.
-
(2003)
LNCS: Vol. 2656. Proc. Eurocrypt 2003
, pp. 272-293
-
-
Gentry, C.1
-
16
-
-
10844241569
-
Revocation invocation for accountable anonymous PKI certificate trees, computers and communications
-
28 June-1 July 2004
-
Critchlow, D., & Zhang, N. (2004). Revocation invocation for accountable anonymous PKI certificate trees, computers and communications. In Proceedings of ISCC 2004, 28 June-1 July 2004 (Vol. 1, pp. 386-392).
-
(2004)
Proceedings of ISCC 2004
, vol.1
, pp. 386-392
-
-
Critchlow, D.1
Zhang, N.2
-
20
-
-
0033733822
-
Certificate revocation and certificate update
-
Naor, M., & Nissim, K. (2000). Certificate revocation and certificate update. IEEE Journal on Selected Areas in Communications, 18 (4), 561-570.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.4
, pp. 561-570
-
-
Naor, M.1
Nissim, K.2
-
21
-
-
18244365875
-
-
Technical Report CSE-TR-366-98, EECS. University of Michigan, Ann Arbor
-
McDaniel, P., & Jamin, S. (1998). Key distribution hierarchy. (Technical Report CSE-TR-366-98, EECS). University of Michigan, Ann Arbor.
-
(1998)
Key Distribution Hierarchy
-
-
McDaniel, P.1
Jamin, S.2
-
22
-
-
27644530407
-
A framework for the revocation of unintended digital signatures initiated by malicious terminals
-
Berta, I. Z., Buttya, L., & Vajda, I. (2005). A framework for the revocation of unintended digital signatures initiated by malicious terminals. IEEE Transactions on Dependable and Secure Computing, 2 (3), 268-272.
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.3
, pp. 268-272
-
-
Berta, I.Z.1
Buttya, L.2
Vajda, I.3
-
23
-
-
33845938314
-
An efficient key revocation protocol for wireless sensor networks
-
Buffalo, New York, 26-29 June 2006
-
Dini, G., & Savino, I. M. (2006). An efficient key revocation protocol for wireless sensor networks. In Proceedings of the 2006 international symposium on a world of wireless, mobile and multimedia networks (WoWMoM'06) (pp. 3-5). Buffalo, New York, 26-29 June 2006.
-
(2006)
Proceedings of the 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'06)
, pp. 3-5
-
-
Dini, G.1
Savino, I.M.2
-
24
-
-
4143075602
-
Neighbour discovery for IP version 6
-
December 1998
-
Narten, T., Nordmark, E., & Simpson, W. (1998). Neighbour discovery for IP version 6. RFC 2461, December 1998.
-
(1998)
RFC 2461
-
-
Narten, T.1
Nordmark, E.2
Simpson, W.3
-
26
-
-
18844424009
-
Efficient state updates for key management
-
Pinkas, B. (2004). Efficient state updates for key management. Proceedings of the IEEE, 92 (6), 910-917.
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 910-917
-
-
Pinkas, B.1
-
28
-
-
4143071218
-
The auto configuration of recursive DNS server and the optimization of DNS name resolution in hierarchical mobile IPv6
-
Jeong, J., Lee, K., Park, J., Lee, H., & Kim, H. (2003). The auto configuration of recursive DNS server and the optimization of DNS name resolution in hierarchical mobile IPv6. In Proc. vehicular technology conference (VTC 2003), Fall 2003 (Vol. 5, pp. 3439-3442).
-
(2003)
Proc. Vehicular Technology Conference (VTC 2003), Fall 2003
, vol.5
, pp. 3439-3442
-
-
Jeong, J.1
Lee, K.2
Park, J.3
Lee, H.4
Kim, H.5
-
29
-
-
77954886850
-
-
The OPNET IT Guru Academic Edition, Last accessed 21st August 2008
-
The OPNET IT Guru Academic Edition (2008). http://www.opnet.com/ university-program/itguru-academic-edition/. Last accessed 21st August 2008.
-
(2008)
-
-
-
30
-
-
36849062175
-
Self-healing group-wise key distribution schemes with time-limited node revocation for wireless sensor networks
-
DOI 10.1109/MWC.2007.4396941
-
Shi, M., Shen, X., Jiang, Y., & Lin, C. (2007). Self-healing groupwise key distribution schemes with time-limited node revocation for wireless sensor networks. IEEE Wireless Communications, 14 (5), 38-46. (Pubitemid 350231652)
-
(2007)
IEEE Wireless Communications
, vol.14
, Issue.5
, pp. 38-46
-
-
Shi, M.1
Shen, X.2
Jiang, Y.3
Lin, C.4
-
31
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
Clifford, B., Neuman, O., & Theodore, T. (1994). Kerberos: an authentication service for computer networks. IEEE Communications, 32 (9), 33-38.
-
(1994)
IEEE Communications
, vol.32
, Issue.9
, pp. 33-38
-
-
Clifford, B.1
Neuman, O.2
Theodore, T.3
-
32
-
-
77954886536
-
OpenPGP message format
-
November 2007
-
Callas, J., Donnerhacke, L., Finney, H., Shaw, D., & Thayer, R. (2007). OpenPGP message format. RFC 4880, November 2007.
-
(2007)
RFC 4880
-
-
Callas, J.1
Donnerhacke, L.2
Finney, H.3
Shaw, D.4
Thayer, R.5
-
34
-
-
46149086521
-
Simplifying PKI usage through a client-server architecture and dynamic propagation of certificate paths and repository addresses
-
University of Marseille, France, 2-6 Sept
-
Hunter, B. (2002). Simplifying PKI usage through a client-server architecture and dynamic propagation of certificate paths and repository addresses. In Proceedings of 13th international workshop on database and expert systems applications (pp. 505-510). University of Marseille, France, 2-6 Sept.
-
(2002)
Proceedings of 13th International Workshop on Database and Expert Systems Applications
, pp. 505-510
-
-
Hunter, B.1
-
35
-
-
18144405252
-
An access control protocol, sometimes called TACACS
-
July 1993
-
Finseth, C. (1993). An access control protocol, sometimes called TACACS. RFC1492, July 1993.
-
(1993)
RFC1492
-
-
Finseth, C.1
-
38
-
-
0003315821
-
IP encapsulating security payload (ESP)
-
November 1998
-
Kent, S., & Atkinson, R. (1998). IP encapsulating security payload (ESP). RFC240, November 1998.
-
(1998)
RFC240
-
-
Kent, S.1
Atkinson, R.2
-
39
-
-
33947383543
-
Dynamic delegation discovery system (DDDS): The domain name system (DNS) database
-
October 2002
-
Mealling, M. (2002). Dynamic delegation discovery system (DDDS): the domain name system (DNS) database. RFC 3403, October 2002.
-
(2002)
RFC 3403
-
-
Mealling, M.1
|