메뉴 건너뛰기




Volumn 1146, Issue , 1996, Pages 325-350

Modelling a public-key infrastructure

Author keywords

Cryptography; Distributed system security; Key management; Probabilistic logic; Public key certification; Recommendations; Trust

Indexed keywords

CRYPTOGRAPHY; PROBABILISTIC LOGICS; PUBLIC KEY CRYPTOGRAPHY; SECURITY SYSTEMS;

EID: 84947294004     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-61770-1_45     Document Type: Conference Paper
Times cited : (233)

References (29)
  • 1
    • 0002863367 scopus 로고
    • Valuation of trust in open systems
    • D. Gollmann (Ed.), Lecture Notes in Computer Science, Berlin: Springer-Verlag
    • T. Beth, M. Borcherding and B. Klein, Valuation of trust in open systems, Computer Security - ESORICS ‘94, D. Gollmann (Ed.), Lecture Notes in Computer Science, Berlin: Springer-Verlag, 1994, vol. 875, pp. 3-18.
    • (1994) Computer Security - ESORICS ‘94 , vol.875 , pp. 3-18
    • Beth, T.1    Borcherding, M.2    Klein, B.3
  • 3
    • 0027612025 scopus 로고
    • Security architectures using formal methods
    • C. Boyd, Security architectures using formal methods, IEEE Journal on Selected Areas in Communications, vol. 11, no. 5, 1993, pp. 694-701.
    • (1993) IEEE Journal on Selected Areas in Communications , vol.11 , Issue.5 , pp. 694-701
    • Boyd, C.1
  • 6
    • 0028514770 scopus 로고
    • Towards a national public-key infrastructure
    • S. Chokhani, Towards a national public-key infrastructure, IEEE Communications Magazine, vol. 32, no. 9, 1994, pp. 70-74.
    • (1994) IEEE Communications Magazine , vol.32 , Issue.9 , pp. 70-74
    • Chokhani, S.1
  • 14
    • 0342446297 scopus 로고
    • A calculus for secure channel establishment in open networks
    • D. Gollmaun (Ed.), Lecture Notes in Computer Science, Berlin: Springer-Verlag
    • U.M. Maurer and P.E. Schmid, A calculus for secure channel establishment in open networks Proc. 1994 European Symposium on Research in Computer Security (ESORICS’ 94), D. Gollmaun (Ed.), Lecture Notes in Computer Science, Berlin: Springer-Verlag, 1994, vol. 875, pp. 175-192.
    • (1994) Proc. 1994 European Symposium on Research in Computer Security (ESORICS’ 94) , vol.875 , pp. 175-192
    • Maurer, U.M.1    Schmid, P.E.2
  • 15
    • 21144468597 scopus 로고
    • KryptoKnight Authentication and Key Distribution System
    • Y. Deswarte, G. Eizenberg, J.-J. Quisquater (Eds.), Lecture Notes in Computer Science, Berlin: Springer-Verlag
    • R. Molva, G. Tsudik, E. Van Herreweghen and S. Zatti, KryptoKnight Authentication and Key Distribution System, Proc. t992 European Symposium on Research in Computer Security (ESORICS 92), Y. Deswarte, G. Eizenberg, J.-J. Quisquater (Eds.), Lecture Notes in Computer Science, Berlin: Springer-Verlag, 1992, vol. 648, pp. 155-174.
    • (1992) Proc. T992 European Symposium on Research in Computer Security (ESORICS 92) , vol.648 , pp. 155-174
    • Molva, R.1    Tsudik, G.2    Van Herreweghen, E.3    Zatti, S.4
  • 17
    • 0022659563 scopus 로고
    • Probabilistic logic
    • N.J. Nilsson, Probabilistic logic, Artificial Intelligence, vol. 28, no. 1, 1986, pp. 71-86.
    • (1986) Artificial Intelligence , vol.28 , Issue.1 , pp. 71-86
    • Nilsson, N.J.1
  • 18
    • 0028439496 scopus 로고
    • Designing Secure Communication Protocols from Trust Specifications
    • C.H. Papadimitriou, V. Rangan, M. Sideri, “Designing Secure Communication Protocols from Trust Specifications”, Algorithmica, 1994, pp. 485-499.
    • (1994) Algorithmica , pp. 485-499
    • Papadimitriou, C.H.1    Rangan, V.2    Sideri, M.3
  • 19
    • 0026854374 scopus 로고
    • An axiomatic theory of trust in secure communication protocols
    • P.V. Rangan, An axiomatic theory of trust in secure communication protocols, Computers & Security, vol. 11, 1992, pp. 163-172.
    • (1992) Computers & Security , vol.11 , pp. 163-172
    • Rangan, P.V.1
  • 20
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R.L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol. 21, no. 2, 1978, pp. 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 21
    • 0003855464 scopus 로고    scopus 로고
    • 2nd edition, John Wiley & Sons, Inc., New York
    • B. Schneier, Applied Cryptography, 2nd edition, John Wiley & Sons, Inc., New York, 1996.
    • (1996) Applied Cryptography
    • Schneier, B.1
  • 24
    • 0027227136 scopus 로고
    • A logical language for specifying cryptographic protocols requirements, Proc. IEEE Conf. on Research in Security and Privacy
    • P. Syverson and C. Meadows, A logical language for specifying cryptographic protocols requirements, Proc. IEEE Conf. on Research in Security and Privacy, 1993, pp. 165-180.
    • (1993) , pp. 165-180
    • Syverson, P.1    Meadows, C.2
  • 28
    • 84949833572 scopus 로고
    • Information technology - open systems interconnection - the directory
    • ISO/IEC International Standard 9594-8, Information technology - open systems interconnection - the directory, Part 8: Authentication framework, 1990.
    • (1990) Part 8: Authentication Framework
  • 29
    • 84949833573 scopus 로고    scopus 로고
    • Internet Request for Comments (RFC)
    • Privacy enhanced mail (PEM), Internet Request for Comments (RFC) 1421-1424.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.