S Koga, K Imamoto, K Sakurai - Multiple Paths to Trust, 2005 - tsapps.nist.gov
The Security Mediator (SEM) approach was proposed by Boneh et al. at USENIX Security Symposium in 2001. However, their Security-Mediated PKI has a drawback that it is …
KPM Anand, P Narayanasamy - 2008 First International …, 2008 - ieeexplore.ieee.org
Real E-business system has some vulnerable facts like denial of service; unavailability of distributed certificates and also creates inconsistency policy by independent stakeholders …
E Karatsiolis - 2007 - tuprints.ulb.tu-darmstadt.de
A public key infrastructure (PKI) secures lots of applications and processes. These are for example the electronic commerce, email communication, access to computers and …