Key Management In Distributed Systems
暂无分享,去创建一个
[1] Tatu Ylönen,et al. The Secure Shell (SSH) Protocol Architecture , 2006, RFC.
[2] Marc Stevens,et al. Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate , 2009, CRYPTO.
[3] Tom Petrocelli,et al. Data Protection and Information Lifecycle Management , 2005 .
[4] R. Reininger. Electronic key management system (EKMS) , 1994, Proceedings of TCC'94 - Tactical Communications Conference.
[5] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[6] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.
[7] Dan Simon,et al. Extensible Authentication Protocol (eap) Key Management Framework , 2007 .
[8] Dan Harkins,et al. The Internet Key Exchange (IKE) , 1998, RFC.
[9] Nancy A. Lynch,et al. Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services , 2002, SIGA.