2022
DOI: 10.1007/978-3-030-98785-5_3
|View full text |Cite
|
Sign up to set email alerts
|

Changing of the Guards: Certificate and Public Key Management on the Internet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 44 publications
0
1
0
Order By: Relevance
“…Cryptographic key management networks may include both long-lived and short-lived keys, depending on the systems for which they are created [3]. The complexity of cryptographic keys varies based on factors such as the length, source, or probability of the key being guessed, along with its resistance to unauthorized access [4]. The traditional methods by which the key is generated, such as those based on computers or natural phenomena, may be common and uncomplicated, but they are not robust enough to meet security challenges.…”
mentioning
confidence: 99%
“…Cryptographic key management networks may include both long-lived and short-lived keys, depending on the systems for which they are created [3]. The complexity of cryptographic keys varies based on factors such as the length, source, or probability of the key being guessed, along with its resistance to unauthorized access [4]. The traditional methods by which the key is generated, such as those based on computers or natural phenomena, may be common and uncomplicated, but they are not robust enough to meet security challenges.…”
mentioning
confidence: 99%