A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
New directions in cryptography
IEEE Transactions on Information Theory
Study on security based on PKI for e-commerce of statistics information system
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
A legally-admissible copyrights ownership identification protocol for digital works
Proceedings of the 4th International Conference on Internet Multimedia Computing and Service
On the self-similarity nature of the revocation data
ISC'12 Proceedings of the 15th international conference on Information Security
Hi-index | 0.24 |
Secure E-Commerce and VPN technology is only possible with the use of appropriate security systems such as encryption, digital signatures, digital certificates, public/private key pairs, non-repudiation, and time-stamping. A PKI comprises a system of certificates, certificate authorities, subjects, relying partners, registration authorities, and key repositories that provide for safe and reliable E-business. This paper discusses these key technologies focusing particularly on recent standardisation as well as looking at some of the criticism and challenges to its widespread operation in the industry.