Is hierarchical public-key certification the next target for hackers?
暂无分享,去创建一个
[1] John M. Boone,et al. INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .
[2] Yvo Desmedt,et al. Secure Communication in an Unknown Network Using Certificates , 1999, ASIACRYPT.
[3] Michael K. Reiter,et al. Path independence for authentication in large-scale systems , 1997, CCS '97.
[4] Yvo Desmedt,et al. Trust and security: A new look at the Byzantine generals problem , 1996, Network Threats.
[5] Ronald L. Rivest,et al. SDSI - A Simple Distributed Security Infrastructure , 1996 .
[6] Bruce Schneier,et al. Ten Risks of PKI , 2004 .
[7] Ueli Maurer,et al. Modelling a Public-Key Infrastructure , 1996, ESORICS.