Sciweavers

17 search results - page 1 / 4
» The Fundamental Inadequacies of Conventional Public Key Infr...
Sort
View
ECIS
2001
13 years 6 months ago
The Fundamental Inadequacies of Conventional Public Key Infrastructure
It has been conventional wisdom that, for e-commerce to fulfil its potential, each party to a transaction must be confident about the identity of the others. Digital signature tec...
Roger Clarke
SIGUCCS
1999
ACM
13 years 9 months ago
Who's Got the Key?
This paper attempts to illuminate several fundamental concepts used in the creation of a Public Key Infrastructure (PKI). These concepts include encryption, public key cryptograph...
David Henry
AGENTS
1998
Springer
13 years 9 months ago
Personal Security Agent: KQML-Based PKI
Certificate management infrastructure, a.k.a. PKI (Public Key Infrastructure), which issues and provides access to public key certificates to preserve the integrity of a public ke...
Qi He, Katia P. Sycara, Timothy W. Finin
ACISP
1998
Springer
13 years 9 months ago
A Solution to Open Standard of PKI
PKI Public Key Infrastructure is fundamental for many security applications on the network. However, there are so many di erent kinds of PKI at current stage and they are not comp...
Qi He, Katia P. Sycara, Zhongmin Su
IJNSEC
2008
145views more  IJNSEC 2008»
13 years 4 months ago
Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing
Most of the current security architectures for grid systems use conventional public key infrastructure (PKI) to authenticate grid members and to secure resource allocation to thes...
Shengbao Wang, Zhenfu Cao, Haiyong Bao