|
Journals in DBLP
- Stefanos Gritzalis
Public Key Infrastructure: Research and Applications. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2006, v:5, n:1, pp:1-2 [Journal]
- Gabriel Vanrenen, Sean Smith, John Marchesini
Distributing security-mediated PKI. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2006, v:5, n:1, pp:3-17 [Journal]
- Antonio Lioy, Marius Marian, Natalia Moltchanova, Massimiliano Pala
PKI past, present and future. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2006, v:5, n:1, pp:18-29 [Journal]
- Jens-Matthias Bohli, Stefan Röhrich, Rainer Steinwandt
Key substitution attacks revisited: Taking into account malicious signers. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2006, v:5, n:1, pp:30-36 [Journal]
- Jianying Zhou, Feng Bao, Robert H. Deng
Minimizing TTP's involvement in signature validation. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2006, v:5, n:1, pp:37-47 [Journal]
- Ninghui Li, John C. Mitchell
Understanding SPKI/SDSI using first-order logic. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2006, v:5, n:1, pp:48-64 [Journal]
|