Distributing Security-Mediated PKI
- 1 January 2004
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 17 references indexed in Scilit:
- Fine-grained control of security capabilitiesACM Transactions on Internet Technology, 2004
- A model of certificate revocationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Windowed certificate revocationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Scalable Secure Storage When Half the System Is FaultyInformation and Computation, 2002
- A Response to “Can We Eliminate Certificate Revocation Lists?”Published by Springer Nature ,2001
- Architectural Support for Copy and Tamper Resistant SoftwarePublished by Defense Technical Information Center (DTIC) ,2000
- Proactive public key and signature systemsPublished by Association for Computing Machinery (ACM) ,1997
- Proactive RSAPublished by Springer Nature ,1997
- Proactive Secret Sharing Or: How to Cope With Perpetual LeakagePublished by Springer Nature ,1995
- Paradigms for process interaction in distributed programsACM Computing Surveys, 1991