PKI-based mutual connections constrained with discrepancy of trust domains

被引:0
|
作者
Zhu, Pengfei [1 ]
Dai, Yingxia [1 ]
Bao, Xuhua [1 ]
机构
[1] State Key Laboratory of Information Security, Graduate University, Chinese Academy of Science, Beijing 100049, China
关键词
D O I
10.1360/crad20061019
中图分类号
学科分类号
摘要
引用
收藏
页码:1804 / 1809
相关论文
共 50 条
  • [21] Modelling and analysis of PKI-based systems using process calculi
    Aziz, Benjamin
    Hamilton, Geoff
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2007, 18 (03) : 593 - 618
  • [22] Extending BAN Logic for Reasoning with Modern PKI-based Protocols
    Sufatrio
    Yap, Roland H. C.
    2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, : 190 - +
  • [23] Design on PKI-Based Anonymous Mobile Agent Security in E-Commerce
    MENG Xiangsong
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1907 - 1910
  • [24] Readers Behaving Badly Reader Revocation in PKI-Based RFID Systems
    Nithyanand, Rishab
    Tsudik, Gene
    Uzun, Ersin
    COMPUTER SECURITY-ESORICS 2010, 2010, 6345 : 19 - 36
  • [25] Design and implementation of a PKI-based electronic documents protection management system
    Liu, Jin-Bao
    Hu, Xian-Qing
    Li, Qiong
    Niu, Xia-Mu
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 87 - +
  • [26] A Forward Secure PKI-based UMTS-AKA with Tunneling Authentication
    Aminmoghadam, Emad
    Mirghadri, Abdolrasol
    2015 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION, NETWORKING, AND WIRELESS COMMUNICATIONS (DINWC), 2015, : 55 - 60
  • [27] A probabilistic model for evaluating the operational cost of PKI-based financial transactions
    Platis, A
    Lambrinoudakis, C
    Leros, A
    PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2004, 3093 : 149 - 159
  • [28] Performance of PKI-based security mechanisms in mobile ad hoc networks
    Schwingenschlögl, C
    Eichler, S
    Müller-Rathgeber, B
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2006, 60 (01) : 20 - 24
  • [29] PKI-Based Security Enhancement for IoT in 5G Networks
    Khan, Nayeem Ahmad
    INVENTIVE COMPUTATION AND INFORMATION TECHNOLOGIES, ICICIT 2021, 2022, 336 : 217 - 225
  • [30] User-aided reader revocation in PKI-based RFID systems
    Nithyanand, Rishab
    Tsudik, Gene
    Uzun, Ersin
    JOURNAL OF COMPUTER SECURITY, 2011, 19 (06) : 1147 - 1172