Binding Bit Patterns to Real World Entities

@inproceedings{Christianson1997BindingBP,
  title={Binding Bit Patterns to Real World Entities},
  author={Bruce Christianson and James A. Malcolm},
  booktitle={Security Protocols Workshop},
  year={1997}
}
Public key cryptography is often used to verify the integrity of a piece of data, or more generally to ensure that operations which modify the data have been requested and carried out by principals who are authorized to do so. This requires keys to be bound to principals in an unforgeably veriiable manner. Cryptographic bit patterns such as electronic key certiicates (EKCs) have a part to play in establishing such bindings, but the requirement ultimately to bind keys to real world entities… CONTINUE READING

From This Paper

Topics from this paper.

References

Publications referenced by this paper.
Showing 1-9 of 9 references

Cryptography and Evidence

M. Roe
PhD thesis, Computer Laboratory, • 1997

The changing Environment for Security Protocols, IEEE Network

R. Needham
1997

Trusting in Computer Systems, PhD thesis, Computer Laboratory, University

W. S. Harbison
1997

Establishing Identity without Certi cation Authorities

C. M. Ellison
Sixth USENIX Security Symposium Procedings • 1996

SDSI - A Simple Distributed Security In frastructure, http://theory.lcs.mit.edu/~rivest

R. L. Rivest, B. Lampson
1996

De Uni catie van Objecttypen en Feittypen een Pracktisch en Diadactisch Vruchtbare Theorie ( UnifyingObject Types and Fact Types : A Practically and Didactically Productive The

H. van der Lek, G. P. Bakema, J. P. C. Zwart
Informatie • 1992

Object typen en Feittypen een Pracktisch en Diadactisch Vruchtbare Theorie (Unifying Object Types and Fact Types : A Practically and Didactically Productive The ory), Informatie

Lek, H. van der, G. P. Bakema, J.P.C. Zwart, De Uni catie van
1992

Similar Papers

Loading similar papers…