Optimization of protocol operations in a Public Key Infrastructure
暂无分享,去创建一个
[1] William Yurcik,et al. A survey of PKI components and scalability issues , 2006, 2006 IEEE International Performance Computing and Communications Conference.
[2] Anders Fongen. Scalability analysis of selected certificate validation scenarios , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[3] E. Winjum,et al. Model and specification for analyzing the scalability of a public key infrastructure , 2009 .
[4] Russ Housley,et al. Delegated Path Validation and Delegated Path Discovery Protocol Requirements , 2001, RFC.
[5] Adam J. Slagell,et al. PKI Scalability Issues , 2004, ArXiv.
[6] Ketil Lund,et al. Web Services i nettverk med begrenset datarate , 2006 .
[7] Anders Fongen. XML Based Certificate Management , 2008 .
[8] Albert-László Barabási,et al. Linked - how everything is connected to everything else and what it means for business, science, and everyday life , 2003 .
[9] David A. Cooper. A more efficient use of delta-CRLs , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[10] Ronald L. Rivest,et al. Can We Eliminate Certificate Revocations Lists? , 1998, Financial Cryptography.
[11] David A. Cooper,et al. A model of certificate revocation , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).