Generalized certificate revocation
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Accountable certificate management using undeniable attestations
Proceedings of the 7th ACM conference on Computer and communications security
Efficient fault-tolerant certificate revocation
Proceedings of the 7th ACM conference on Computer and communications security
Certificate based PKI and B2B E-commerce: suitable match or not?
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Reducing certificate revocation cost using NPKI
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
COCA: A secure distributed online certification authority
ACM Transactions on Computer Systems (TOCS)
Eliminating counterevidence with applications to accountable certificate management
Journal of Computer Security
Hash to the Rescue: Space Minimization for PKI Directories
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI)
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys
FC '99 Proceedings of the Third International Conference on Financial Cryptography
A Response to ''Can We Eliminate Certificate Revocation Lists?''
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Efficient Long-Term Validation of Digital Signatures
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Cert'eM: Certification System Based on Electronic Mail Service Structure
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
SiBIR: Signer-Base Intrusion-Resilient Signatures
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
A novel approach to certificate revocation management
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
A Logical Reconstruction of SPKI
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Proceedings of the 10th ACM conference on Computer and communications security
Tradeoffs in certificate revocation schemes
ACM SIGCOMM Computer Communication Review
A logical reconstruction of SPKI
Journal of Computer Security - Special issue on CSFW14
Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure
ACM Transactions on Information and System Security (TISSEC)
Using certified policies to regulate E-commerce transactions
ACM Transactions on Internet Technology (TOIT)
Inferring dynamic credentials for rôle-based trust management
Proceedings of the 8th ACM SIGPLAN international conference on Principles and practice of declarative programming
Automating security configuration for the Grid
Scientific Programming - International Symposium of Parallel and Distributed Computing & International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogenous Networks
A method for fast revocation of public key certificates and security capabilities
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Addressing Credential Revocation in Grid Environments
GRID '05 Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
A method for fast revocation of public key certificates and security capabilities
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Authorization in trust management: Features and foundations
ACM Computing Surveys (CSUR)
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Optimized Certificates --- A New Proposal for Efficient Electronic Document Signature Validation
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Empirical Analysis of Certificate Revocation Lists
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Beacon certificate push revocation
Proceedings of the 2nd ACM workshop on Computer security architectures
Certificate revocation release policies
Journal of Computer Security
The fable of the bees: incentivizing robust revocation decision making in ad hoc networks
Proceedings of the 16th ACM conference on Computer and communications security
Certificate revocation using fine grained certificate space partitioning
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
SecPAL: Design and semantics of a decentralized authorization language
Journal of Computer Security - Digital Identity Management (DIM 2007)
Survivable key compromise in software update systems
Proceedings of the 17th ACM conference on Computer and communications security
Reducing the cost of certificate revocation: a case study
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
Design and implementation of a public key-based group collaboration system
Computer Communications
Flexible secure inter-domain interoperability through attribute conversion
Information Sciences: an International Journal
Secommunity: a framework for distributed access control
LPNMR'11 Proceedings of the 11th international conference on Logic programming and nonmonotonic reasoning
Decentralised access control in 802.11 networks
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
A grid authentication system with revocation guarantees
HiPC'05 Proceedings of the 12th international conference on High Performance Computing
A new united certificate revocation scheme in grid environments
GCC'05 Proceedings of the 4th international conference on Grid and Cooperative Computing
Separable implicit certificate revocation
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Towards a framework for evaluating certificate status information mechanisms
Computer Communications
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
Analysis of mobile authentication protocols by SVO logic
Proceedings of the First International Conference on Security of Internet of Things
Hi-index | 0.00 |