Public Key Infrastructure
暂无分享,去创建一个
[1] Bruce Schneier,et al. Protecting secret keys with personal entropy , 2000, Future Gener. Comput. Syst..
[2] Dan Simon,et al. PPP EAP TLS Authentication Protocol , 1999, RFC.
[3] Eric A. Brewer,et al. Harvest, yield, and scalable tolerant systems , 1999, Proceedings of the Seventh Workshop on Hot Topics in Operating Systems.
[4] Ronald L. Rivest,et al. Can We Eliminate Certificate Revocations Lists? , 1998, Financial Cryptography.
[5] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[6] Charles L. Hedrick. Telnet remote flow control option , 1988, RFC.
[7] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.