A public key cryptosystem and a signature scheme based on discrete logarithms
Proceedings of CRYPTO 84 on Advances in cryptology
A course in number theory and cryptography
A course in number theory and cryptography
Dr. Dobb's Journal
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Secure communications over insecure channels
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Jonah: experience implementing PKIX reference freeware
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Evolving service semantics cooperatively: a consumer-driven approach
Autonomous Agents and Multi-Agent Systems
Surprise: user-controlled granular privacy and security for personal data in SmarterContext
CASCON '12 Proceedings of the 2012 Conference of the Center for Advanced Studies on Collaborative Research
On the risk of misbehaving RPKI authorities
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks
Hi-index | 0.00 |
Long before the advent of electronic systems, different methods of information scrambling were used. Early attempts at data security in electronic computers employed some of the same transformations. Modern secret key cryptography brought much greater security, but eventually proved vulnerable to brute-force attacks. Public key cryptography has now emerged as the core technology for modern computing security systems. By associating a public key with a private key, many of the key distribution problems of earlier systems are avoided. The Internet public key infrastructure provides the secure digital certification required to establish a network of trust for public commerce. This paper explores the details of the infrastructure.