Walking the Web of trust
暂无分享,去创建一个
[1] Nathalie Weiler,et al. The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..
[2] Mark K. Lottor. Domain Administrators Operations Guide , 1987, RFC.
[3] Ueli Maurer,et al. Modelling a Public-Key Infrastructure , 1996, ESORICS.
[4] Germano Caronni. Dynamic security in communication systems , 1999 .
[5] Ueli Maurer,et al. A Calculus for Secure Channel Establishment in Open Networks , 1994, ESORICS.
[6] U. Maurer. A Uniied and Generalized Treatment of Authentication Theory , 1996 .
[7] Ashar Aziz,et al. SKIP-securing the Internet , 1996, Proceedings of WET ICE '96. IEEE 5th Workshop on Enabling Technologies; Infrastucture for Collaborative Enterprises.
[8] Armin Liebl,et al. Authentication in distributed systems: a bibliography , 1993, OPSR.
[9] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[10] Ueli Maurer. A Unified and Generalized Treatment of Authentification Theory , 1996, STACS.
[11] Paul Albitz,et al. DNS and BIND , 1994 .
[12] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[13] Christian Huitema,et al. The X.500 Directory Services , 1988, Comput. Networks.
[14] Chris Mitchell,et al. Security defects in CCITT recommendation X.509: the directory authentication framework , 1990, CCRV.
[15] Donald E. Eastlake,et al. Domain Name System Security Extensions , 1997, RFC.