1995
DOI: 10.1145/219618.219714
|View full text |Cite
|
Sign up to set email alerts
|

Advances in public-key certificate standards

Abstract: To build effective public-key infrastructures, well-entrenched standards are essential because many different applications and different vendor products need to be supported and used. Standards for public-key certificate and certificate revocation list (CRL) formats are most important. The recognized standard in this area is ITU-T X.509, first published in 1988. In 1993, the Internet Privacy Enhanced Mail (PEM) proposals refined the use of X.509. However, more recently it has become apparent that there are sev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2000
2000
2013
2013

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…Moreover, these studies have considered the following methods to provide authentication in electronic Payment systems (including Mobile commerce (M-commerce): username/password, symmetric, asymmetric and elliptic curve cryptography, smart card, 2d bar code, and biometric methods. There are many authentication mechanisms and protocols based on these methods [3,4,11,12,15,25,26,33,35,40,47] but some of them do not offer enough security for M-commerce whilst symmetric and asymmetric signatures have been widely used for authentication purposes.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, these studies have considered the following methods to provide authentication in electronic Payment systems (including Mobile commerce (M-commerce): username/password, symmetric, asymmetric and elliptic curve cryptography, smart card, 2d bar code, and biometric methods. There are many authentication mechanisms and protocols based on these methods [3,4,11,12,15,25,26,33,35,40,47] but some of them do not offer enough security for M-commerce whilst symmetric and asymmetric signatures have been widely used for authentication purposes.…”
Section: Related Workmentioning
confidence: 99%
“…Given our trust model this is easy to require of the set of clients and servers. For WayStations, we depend on the presence of a public key infrastructure [4,6] or alternate key management system [10]. Note that merely knowing the public key of a WayStation does not automatically convey a trust relationship; it merely establishes the identity of that WayStation.…”
Section: Trust and Threat Modelmentioning
confidence: 99%
“…Recently, there has been substantial interest in public key technologies [2,3,4] being used to support secure electronic communications. In order to use public key cryptography, it is necessary to make an entity's public key available to others in such a way that its authenticity (i.e., its status as the true public key of that entity) and validity are verifiable.…”
Section: Introductionmentioning
confidence: 99%