An Examination of Asserted PKI Issues and Pro- posed Alternatives
暂无分享,去创建一个
[1] Stefan A. Brands,et al. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy , 2000 .
[2] Roger Clarke,et al. The Fundamental Inadequacies of Conventional Public Key Infrastructure , 2001, ECIS.
[3] Russ Housley,et al. Delegated Path Validation and Delegated Path Discovery Protocol Requirements , 2001, RFC.
[4] Donald E. Eastlake,et al. Domain Name System Security Extensions , 1997, RFC.
[5] Stephen Farrell,et al. Internet X.509 Public Key Infrastructure Certificate Management Protocols , 1999, RFC.
[6] Ronald L. Rivest,et al. SDSI - A Simple Distributed Security Infrastructure , 1996 .
[7] M. Ufuk Çaglayan,et al. An efficient, dynamic and trust preserving public key infrastructure , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[8] Stephen Dohrmann,et al. Public-key Support for Collaborative Groups , 2002 .
[9] Tim Dean,et al. Domain Security Services using S/MIME , 2001, RFC.
[10] Russ Housley,et al. An Internet Attribute Certificate Profile for Authorization , 2002, RFC.
[11] Craig Gentry,et al. Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.
[12] S. Micali,et al. NOVOMODO : Scalable Certificate Validation and Simplified PKI Management , 2002 .
[13] Jon Callas,et al. OpenPGP Message Format , 1998, RFC.
[14] Steve Hanna,et al. Building Certifications Paths: Forward vs. Reverse , 2001, NDSS.
[15] Morrie Gasser,et al. An architecture for practical delegation in a distributed system , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[16] Peter Gutmann,et al. PKI: It's Not Dead, Just Resting , 2002, Computer.
[17] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[18] Jeff Hodges,et al. Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V2. 0 , 2001 .
[19] Canada,et al. Extended Validation Models in PKI : Alternatives and Implications , 2002 .
[20] Moni Naor,et al. Certificate revocation and certificate update , 1998, IEEE Journal on Selected Areas in Communications.
[21] Joan Feigenbaum,et al. The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.