메뉴 건너뛰기




Volumn 1841, Issue , 2000, Pages 206-219

The PKI specification dilemma: A formal solution

Author keywords

[No Author keywords available]

Indexed keywords

PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 84958763157     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/10718964_17     Document Type: Conference Paper
Times cited : (2)

References (20)
  • 3
    • 84959026377 scopus 로고    scopus 로고
    • June
    • DR 222. Defect Report Number DR 222: Certificate Policy Mapping. Available from ftp://ftp.bull.com/pub/OSIdirectory/DefectResolution/DefectReports/X.5 09/, June 1999.
    • (1999) Certificate Policy Mapping
    • Defect, D.R.1
  • 6
    • 84958977856 scopus 로고    scopus 로고
    • RCF 2459, Internet X.509 Public Key Infrastructure - Part I: Certificate and CRL Profile
    • January
    • R. Housley, W. Ford, W. Polk, and D. Solo. RCF 2459, Internet X.509 Public Key Infrastructure - Part I: Certificate and CRL Profile. Internet Request for Comments 2459, January 1999.
    • (1999) Internet Request for Comments , vol.2459
    • Housley, R.1    Ford, W.2    Polk, W.3    Solo, D.4
  • 8
    • 84963829761 scopus 로고    scopus 로고
    • Towards certificate verification in a certificate management system
    • Jenny Edwards, editor, Canberra, Australia, January-3February, IEEE Computer Society
    • C. Liu, M. A. Ozols, M. Henderson, and T. Cant. Towards certificate verification in a certificate management system. In Jenny Edwards, editor, Proceedings of the 23rd Australasian Computer Science Conference, ACSC2000, pages 150-157, Canberra, Australia, 31 January-3February 2000. IEEE Computer Society.
    • (2000) Proceedings of the 23Rd Australasian Computer Science Conference, ACSC2000 , vol.31 , pp. 150-157
    • Liu, C.1    Ozols, M.A.2    Henderson, M.3    Cant, T.4
  • 10
    • 0000926365 scopus 로고    scopus 로고
    • Modeling a public-key infrastructure
    • E. Bertino, H. Knurth, G. Martella, and E. Montolivo, editors, Springer-Verlag
    • Ueli Maurer. Modeling a public-key infrastructure. In E. Bertino, H. Knurth, G. Martella, and E. Montolivo, editors, Computer Security - ESORICS'96 (LNCS 1146). Springer-Verlag, 1996.
    • (1996) Computer Security - ESORICS'96 (LNCS 1146)
    • Maurer, U.1
  • 14
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1-2):85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.C.1
  • 15
    • 84958986357 scopus 로고    scopus 로고
    • University of Cambridge, Computer Laboratory
    • Lawrence C. Paulson. The Isabelle Reference Manual. University of Cambridge, Computer Laboratory, available from http://www.in.tum.de/ isabelle/dist.
    • Paulson. the Isabelle Reference Manual
    • Lawrence, C.1
  • 18
    • 0029484376 scopus 로고
    • Modelling and verifying key-exchange protocols using csp and fdr
    • IEEE Computer Society Press
    • A. W. Roscoe. Modelling and verifying key-exchange protocols using csp and fdr. In 8th Computer Security Foundation Workshop, pages 98-107. IEEE Computer Society Press, 1995.
    • (1995) 8Th Computer Security Foundation Workshop , pp. 98-107
    • Roscoe, A.W.1
  • 19
    • 0003855464 scopus 로고    scopus 로고
    • 2nd edition, John Wiley & Sons, Inc
    • B. Schneier. Applied Cryptography. 2nd edition, John Wiley & Sons, Inc., 1996.
    • (1996) Applied Cryptography
    • Schneier, B.1
  • 20
    • 84958954577 scopus 로고    scopus 로고
    • The Directory: Authentication Framework
    • X.509. Information Technology - Open systems Interconnection -, June
    • X.509. Information Technology - Open systems Interconnection - The Directory: Authentication Framework. ITU-T Recommendation X.509, June 1997.
    • (1997) ITU-T Recommendation X , pp. 509


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.