Two methods of authenticated positioning
Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks
A secure multiple-agent cryptographic key recovery system
IRI'09 Proceedings of the 10th IEEE international conference on Information Reuse & Integration
Privacy preserving multiparty multilevel DRM architecture
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Hi-index | 0.00 |
Secure VPN technology is only possible with theuse of appropriate security systems such asencryption, digital signatures, digital certificates,public/private key pairs, non-repudiation, andtime-stamping. A PKI comprises a system ofcertificates, certificate authorities, subjects,relying partners, registration authorities, and keyrepositories that provide for safe and reliablecommunications. This paper discusses these keytechnologies focusing particularly on recentstandardisation as well as looking at some of thechallenges pending its widespread operation inthe industry.