The Profile for Algorithms and Key Sizes for Use in the Resource Public Key Infrastructure (RPKI)
暂无分享,去创建一个
[1] Burton S. Kaliski,et al. PKCS #10: Certification Request Syntax Specification Version 1.7 , 2000, RFC.
[2] Stephen T. Kent,et al. An Infrastructure to Support Secure Internet Routing , 2012, RFC.
[3] Geoff Huston,et al. A Profile for X.509 PKIX Resource Certificates , 2012, RFC.
[4] Stephen T. Kent,et al. Certificate Policy (CP) for the Resource Public Key Infrastructure (RPKI) , 2012, RFC.
[5] Sean Turner. Using SHA2 Algorithms with Cryptographic Message Syntax , 2010, RFC.
[6] Stephen T. Kent,et al. Signed Object Template for the Resource Public Key Infrastructure (RPKI) , 2012, RFC.
[7] Jim Schaad. Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF) , 2005, RFC.
[8] Scott O. Bradner,et al. Key words for use in RFCs to Indicate Requirement Levels , 1997, RFC.
[9] Russ Housley,et al. Additional Algorithms and Identifiers for RSA Cryptography for use in the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2005, RFC.
[10] David Cooper,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.
[11] Russ Housley. Cryptographic Message Syntax (CMS) Algorithms , 2002, RFC.