A Certification Scheme for Electronic Commerce

@inproceedings{Crispo1996ACS,
  title={A Certification Scheme for Electronic Commerce},
  author={Bruno Crispo and T. Mark A. Lomas},
  booktitle={Security Protocols Workshop},
  year={1996}
}
This paper examines trust in distributed systems. The particular example that we choose is that of key certiication, although the techniques have more general application. Existing system do not provide suucient evidence to help to resolve disputes. We address this problem. 
Highly Cited
This paper has 21 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.
14 Citations
12 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 14 extracted citations

A Public Key Infrastructure Model for Turkey g = * ( d 0

  • QWHUQHW NXOODQÕPÕQÕQ DVNHUL DODQGDQ VLYLO DODQD, OH DoÕN RODQ NXOODQÕFÕ DGÕ, RNDO D÷Õ JHQHO RODUDN GÕú WHKGLWOHUGHQ NRUXPDN LoLQ DWH ILUHZDOOV, D÷ YHQOLNLVWHUOHULQGHQELULGH, HULQGH GRODúDQ ELOJLQLQ VDGHFH LVWHQHQ LQVDQODU WDUDIÕQGDQ
  • 2002

References

Publications referenced by this paper.
Showing 1-10 of 12 references

Saltzer. Section E.2.1: Kerberos Authentication and Authorization System

  • J. I Schiller S.P. Miller, J.H.B.C. Neumann
  • Technical report, MIT Project Athena,
  • 1987
Highly Influential
5 Excerpts

Password - r2.5: Certi cation authority requirements

  • M. Roe
  • Technical report,
  • 1992
1 Excerpt

Desmedt . Weaknesses of Undeniable Signature Schemes

  • Y. M.Yung
  • Advancesin Cryptology : Eurocrypt
  • 1991

Bellovin . Limitations of the Kerberos Authentication System

  • M. M.MerrittS.
  • Computer Communication Review
  • 1990

Similar Papers

Loading similar papers…