Sciweavers

6 search results - page 2 / 2
» Architectural Defects of the Secure Shell
Sort
View
ECIS
2001
13 years 7 months ago
The Fundamental Inadequacies of Conventional Public Key Infrastructure
It has been conventional wisdom that, for e-commerce to fulfil its potential, each party to a transaction must be confident about the identity of the others. Digital signature tec...
Roger Clarke