Vulnerability analysis of certificate graphs
暂无分享,去创建一个
[1] Michael K. Reiter,et al. Authentication metric analysis and design , 1999, TSEC.
[2] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[3] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[4] Christian Huitema,et al. Associating Metrics to Certification Paths , 1992, ESORICS.
[5] Alexander Aiken,et al. Attack-Resistant Trust Metrics for Public Key Certification , 1998, USENIX Security Symposium.
[6] Stephen Farrell,et al. Internet X.509 Public Key Infrastructure Certificate Management Protocols , 1999, RFC.
[7] Carson C. Chow,et al. Small Worlds , 2000 .
[8] Carl M. Ellison,et al. SPKI Requirements , 1999, RFC.
[9] Ehab S. Elmallah,et al. Optimal Dispersal of Certificate Chains , 2004, DISC.
[10] Gesine Reinert,et al. Small worlds , 2001, Random Struct. Algorithms.
[11] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.
[12] Ueli Maurer,et al. Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence , 2000, Public Key Cryptography.
[13] Ronald L. Rivest,et al. SDSI - A Simple Distributed Security Infrastructure , 1996 .
[14] Michael K. Reiter,et al. Resilient Authentication Using Path Independence , 1998, IEEE Trans. Computers.
[15] Srdjan Capkun,et al. Small worlds in security systems: an analysis of the PGP certificate graph , 2002, NSPW '02.
[16] Ueli Maurer,et al. Modelling a Public-Key Infrastructure , 1996, ESORICS.
[17] Koichi Wada,et al. An optimal certificate dispersal algorithm for mobile ad hoc networks , 2004, Third International Symposium on Parallel and Distributed Computing/Third International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogeneous Networks.
[18] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.
[19] Stephen Farrell,et al. Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP) , 2005, RFC.