Online Certification Status Verification with a Red-Black Hash Tree
暂无分享,去创建一个
[1] Ronald L. Rivest,et al. Can We Eliminate Certificate Revocations Lists? , 1998, Financial Cryptography.
[2] H. Kikuchi. Performance Evaluation of Certificate Revocation Using k-ary Hash Tree , 1999 .
[3] Tim Howes,et al. Internet X.509 Public Key Infrastructure Operational Protocols - LDAPv2 , 1999, RFC.
[4] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[5] Niklaus Wirth,et al. Algorithms and Data Structures , 1989, Lecture Notes in Computer Science.
[6] Peifang Zheng,et al. Tradeoffs in certificate revocation schemes , 2003, CCRV.
[7] Marco Prandini,et al. A novel approach to on-line status authentication of public-key certificates , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[8] Carlisle M. Adams,et al. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP , 1999, RFC.
[9] Ronald L. Rivest,et al. Introduction to Algorithms , 1990 .
[10] Tim Howes,et al. Internet X.509 Public Key Infrastructure LDAPv2 Schema , 1999, RFC.
[11] Peter Gemmell,et al. Efficient and Fresh Cerification , 2000, Public Key Cryptography.
[12] Stephen Farrell,et al. Internet X.509 Public Key Infrastructure Certificate Management Protocols , 1999, RFC.
[13] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and CRL Profile , 1999, RFC.
[14] Moni Naor,et al. Certificate revocation and certificate update , 1998, IEEE Journal on Selected Areas in Communications.
[15] Paul C. Kocher. On Certificate Revocation and Validation , 1998, Financial Cryptography.
[16] S. Micali,et al. NOVOMODO : Scalable Certificate Validation and Simplified PKI Management , 2002 .
[17] Dan Boneh,et al. A Method for Fast Revocation of Public Key Certificates and Security Capabilities , 2001, USENIX Security Symposium.
[18] Shohachiro Nakanishi,et al. Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree , 1999, ISW.