Public Key Infrastructure Overview

@inproceedings{WeiseSunps2001PublicKI,
  title={Public Key Infrastructure Overview},
  author={Joel Weise-Sunps},
  year={2001}
}
  • Joel Weise-Sunps
  • Published 2001

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-7 of 7 extracted citations

Proxy-Based Web Service Security

2008 IEEE Asia-Pacific Services Computing Conference • 2008
View 13 Excerpts
Highly Influenced

Trust, risk and public key infrastructure model on e-procurement adoption

2017 5th International Conference on Cyber and IT Service Management (CITSM) • 2017
View 2 Excerpts

Certificate-Based Strategy to Auction Model for E-Procurement in Indonesia: A Review on Local Ethics and the Future Challenges

2016 6th International Conference on Information and Communication Technology for The Muslim World (ICT4M) • 2016
View 1 Excerpt

HySecNJoining: A hybrid secure node joining algorithm for wireless sensor network

2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011) • 2011
View 1 Excerpt

Service oriented software package bank

Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005. • 2005

References

Publications referenced by this paper.
Showing 1-7 of 7 references

NIST PKI Project Team, Certificate Issuing and Management Components Protection Profile

NIST PKI Project Team, Certificate Issuing and Management Components Protection Profile • 2001

Internet Public Key Infrastructure, X509 Certificates and CRL Profile RFC 2459

Russell Housley
Internet Public Key Infrastructure, X509 Certificates and CRL Profile RFC 2459 • 1999

Bruce Schneier, Applied Cryptography

Bruce Schneier, Applied Cryptography • 1995

Certificate Policy and Certification Practices Framework, RFC 2527 Author's Bio: Joel Weise

S Chokhani
Certificate Policy and Certification Practices Framework, RFC 2527 Author's Bio: Joel Weise

Similar Papers

Loading similar papers…