Is hierarchical public-key certification the next target for hackers?

  • Authors:
  • Mike Burmester;Yvo G. Desmedt

  • Affiliations:
  • Florida State University, Tallahassee;Royal Holloway, University of London

  • Venue:
  • Communications of the ACM - Interactive immersion in 3D graphics
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Considering alternatives to hierarchical authentication structures that are not sufficiently secure for communication on open networks such as the Internet.