Modelling a public-key infrastructure
DOI10.1007/3-540-61770-1_45zbMATH Open1493.68046OpenAlexW1490838413MaRDI QIDQ5096419FDOQ5096419
Authors: Ueli M. Maurer
Publication date: 16 August 2022
Published in: Computer Security — ESORICS 96 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-61770-1_45
Recommendations
trustcryptographykey managementprobabilistic logicdistributed system securitypublic-key certificationrecommendations
Cryptography (94A60) Probability and inductive logic (03B48) Distributed systems (68M14) Computer security (68M25)
Cites Work
- Title not available (Why is that?)
- A method for obtaining digital signatures and public-key cryptosystems
- Probabilistic logic
- New directions in cryptography
- Title not available (Why is that?)
- A logic of authentication
- Probability logic
- Title not available (Why is that?)
- Title not available (Why is that?)
- Valuation of trust in open networks
- A calculus for secure channel establishment in open networks
- Designing secure communication protocols from trust specifications
- Title not available (Why is that?)
Cited In (21)
- MODELLING AND ANALYSIS OF PKI-BASED SYSTEMS USING PROCESS CALCULI
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- A model for distribution and revocation of certificates
- Title not available (Why is that?)
- Title not available (Why is that?)
- Knowledge issues raised in modelling trust in a public key infrastructure
- Title not available (Why is that?)
- LMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword search
- Using probabilistic argumentation for key validation in public-key cryptography
- Trust-Rated Authentication for Domain-Structured Distributed Systems
- Title not available (Why is that?)
- A Closer Look at PKI: Security and Efficiency
- A distributed trust model with high-compatibility based on bridge CA
- A dynamic evaluating method of confidence within CA in PKI system
- Web of trust: applying probabilistic argumentation to public-key cryptography
- Modeling Distributed Private Key Generation by Composing Petri Nets
- Title not available (Why is that?)
- Title not available (Why is that?)
- Public key infrastructure overview
This page was built for publication: Modelling a public-key infrastructure
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5096419)