The official PGP user's guide
PGP: Pretty Good Privacy
Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations
Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations
Deficiencies in LDAP when used to support PKI
Communications of the ACM
A structured hierarchical P2P model based on a rigorous binary tree code algorithm
Future Generation Computer Systems - Special section: Information engineering and enterprise architecture in distributed computing environments
An overview of PKI trust models
IEEE Network: The Magazine of Global Internetworking
Assessment of E-Commerce security using AHP and evidential reasoning
Expert Systems with Applications: An International Journal
The Journal of Supercomputing
Hi-index | 0.01 |
To solve the scalability problems of the identity authentication model based on CA for application in large distributed networks, adopting a rigorous binary tree code algorithm, we present a distributed identity authentication model based on public keys. The advantages of our model are described as follows: First, it has good scalability and is suitable for large-scale distributed networks. Second, the authentication path is short, with no more than two entities intervening. Third, it does not require users to inquire about certificate revocation lists.