A taxonomy for key escrow encryption systems
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
A Proposed Architecture for Trusted Third Party Services
Proceedings of the International Conference on Cryptography: Policy and Algorithms
The Oakley Key Determination Protocol
The Oakley Key Determination Protocol
The GCHQ protocol and its problems
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Hi-index | 0.00 |
Security services based on cryptographic mechanisms assume cryptographic keys to be available to the communicating parties prior to secure communications. Key management techniques depend on the underlying cryptographic techniques, the intended use of the keys and the security policy in use. This article describes such techniques, and especially a variety of key establishment mechanisms. In addition, relevant standardization activities are discussed.