-
1
-
-
0343264604
-
-
R. Anderson, B. Crispo, J. Lee, C. Manifavas, V. Matyas, F. Petitcolas, The Global Internet Trust Register, MIT Press, 1999.
-
(1999)
The Global Internet Trust Register, MIT Press
-
-
Anderson, R.1
Crispo, B.2
Lee, J.3
Manifavas, C.4
Matyas, V.5
Petitcolas, F.6
-
2
-
-
0031143168
-
Merging and extending the PGP and PEM trust models: The ICE-TEL trust model
-
D. W. Chadwick, A. J. Young, and N. K. Cicovic, Merging and extending the PGP and PEM trust models: the ICE-TEL trust model, IEEE Network, 11(3), 16–24, 1997.
-
(1997)
IEEE Network
, vol.11
, Issue.3
, pp. 16-24
-
-
Chadwick, D.W.1
Young, A.J.2
Cicovic, N.K.3
-
3
-
-
84947456788
-
-
Defense Information Systems Agency, State Analysis ofCertific ation Path Processing Procedures, June
-
Defense Information Systems Agency, State Analysis ofCertific ation Path Processing Procedures, June 2000. http://www-pki.itsi.disa.mil/certpathproc.htm
-
(2000)
-
-
-
4
-
-
0003593599
-
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen, SPKI Certificate Theory, Request for Comment 2693, September 1999. ftp://ftp.isi.edu/in-notes/rfc2693.txt
-
(1999)
SPKI Certificate Theory, Request for Comment 2693
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
5
-
-
84947456789
-
-
Federal Public Key Infrastructure Steering Committee
-
Federal Public Key Infrastructure Steering Committee http://www.cio.gov/fpkisc/
-
-
-
-
6
-
-
84947422955
-
Weaknesses in Public Key Infrastructures, Proceedings of the First Workshop on Information Security Applications (WISA
-
M. Henderson, M. Burmester, E. Dawson, and E. Okamoto, Weaknesses in Public Key Infrastructures, Proceedings of the First Workshop on Information Security Applications (WISA 2000), November 2000, 53–66.
-
(2000)
November
, vol.2000
, pp. 53-66
-
-
Henderson, M.1
Burmester, M.2
Dawson, E.3
Okamoto, E.4
-
7
-
-
0003308762
-
-
R. Housley, W. Ford, T. Polk, and D. Solo, Internet X.509 Public Key Infrastructure Certificate and CRL Profile Request for Comment 2459, 1999. http://www.ietf.org/html.charters/pkix-charter.html.
-
(1999)
Solo, Internet X.509 Public Key Infrastructure Certificate and CRL Profile Request for Comment
, pp. 2459
-
-
Housley, R.1
Ford, W.2
Polk, T.3
-
8
-
-
46249089605
-
Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure
-
R. Housley and T. Polk, Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure, John Wiley and Sons, 2001.
-
(2001)
John Wiley and Sons
-
-
Housley, R.1
Polk, T.2
-
9
-
-
84947456791
-
-
ITU-T Recommendation X.509, Information Technology - Open Systems Interconnection - The Directory: Authentication Framework, June 1997 (equivalent to ISO/IEC 9594-8, 1997)
-
ITU-T Recommendation X.509, Information Technology - Open Systems Interconnection - The Directory: Authentication Framework, June 1997 (equivalent to ISO/IEC 9594-8, 1997). http://www.imc.org/ietf-pkix/mail-archive/msg04337.html
-
-
-
-
11
-
-
84947425143
-
A State-Based Model for Certificate Management Systems, Public Key Cryptography: Third International Workshop on Practice and Theory in Public Key Cryptography (PKC 2000)
-
C. Liu, M. Ozols, M. Henderson, and T. Cant, A State-Based Model for Certificate Management Systems, Public Key Cryptography: Third International Workshop on Practice and Theory in Public Key Cryptography (PKC 2000), Lecture Notes in Computer Science, 1751, 2000, 75–92.
-
(2000)
Lecture Notes in Computer Science
, vol.1751
, pp. 75-92
-
-
Liu, C.1
Ozols, M.2
Henderson, M.3
Cant, T.4
-
12
-
-
84958763157
-
The PKI Specification Dilemma: A Formal Solution, Proceedings of the 5th Australasian Conference on Information Security and Privacy (ACISP 2000)
-
M. Ozols, M. Henderson, C. Liu, and T. Cant, The PKI Specification Dilemma: A Formal Solution, Proceedings of the 5th Australasian Conference on Information Security and Privacy (ACISP 2000), Lecture Notes in Computer Science, 1841, 2000, 206–219.
-
(2000)
Lecture Notes in Computer Science
, vol.1841
, pp. 206-219
-
-
Ozols, M.1
Henderson, M.2
Liu, C.3
Cant, T.4
-
13
-
-
0033314753
-
An Overview of PKI Trust Models
-
R. Perlman, An Overview of PKI Trust Models, IEEE Network, 13(6), 38–43, 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 38-43
-
-
Perlman, R.1
-
14
-
-
84947456793
-
The Official PGP User’s Guide, MIT Press, Cambridge
-
P. R. Zimmermann, The Official PGP User’s Guide, MIT Press, Cambridge, Massachussets, 1995.
-
(1995)
Massachussets
-
-
Zimmermann, P.R.1
|