Sciweavers

6 search results - page 2 / 2
» Architectural Defects of the Secure Shell
Sort
View
67
Voted
ECIS
2001
14 years 11 months ago
The Fundamental Inadequacies of Conventional Public Key Infrastructure
It has been conventional wisdom that, for e-commerce to fulfil its potential, each party to a transaction must be confident about the identity of the others. Digital signature tec...
Roger Clarke