Network security via private-key certificates
ACM SIGOPS Operating Systems Review
A semantics for a logic of authentication (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
Authentication in distributed systems: a bibliography
ACM SIGOPS Operating Systems Review
Defective Sign & Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML
Proceedings of the General Track: 2002 USENIX Annual Technical Conference
Compliance defects in public-key cryptography
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Tutorial: Security in computer networks and distributed systems
Computer Communications
Hi-index | 0.00 |
Security defects to be found in C.C.I.T.T. Recommendation X.509-1988 are described together with possible solutions.