1994
DOI: 10.1109/35.312846
|View full text |Cite
|
Sign up to set email alerts
|

Toward a national public key infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

1995
1995
2015
2015

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(23 citation statements)
references
References 4 publications
0
23
0
Order By: Relevance
“…The other operation is validation, it is the process of verifying the validity of the certifications (still valid or not). A complete public key infrastructure is composed of several components which are: registration authority (RA), certificate authority (CA), security policy, PKI-enabled applications, distribution system, and certificate repository [5] [6]. The components of the PKI are shown in Figure 2 and are described as.…”
Section: Pki's Component and Operationmentioning
confidence: 99%
See 1 more Smart Citation
“…The other operation is validation, it is the process of verifying the validity of the certifications (still valid or not). A complete public key infrastructure is composed of several components which are: registration authority (RA), certificate authority (CA), security policy, PKI-enabled applications, distribution system, and certificate repository [5] [6]. The components of the PKI are shown in Figure 2 and are described as.…”
Section: Pki's Component and Operationmentioning
confidence: 99%
“…All revocations mechanism needs to be timely and efficient. One of the revocation mechanism is CRL (Certificate Revocation List) which is a list contains certificate the have been revoked and signed digitally by the entity who had issued those certificates previously [5] [7] [8].…”
Section: Pki's Component and Operationmentioning
confidence: 99%
“…A Public Key Infrastructure (PKI) (Chokhani, 1994;Csinger & Siau, 1998) based on X.509v3 certificates (ITU/T, 1997) had previously been installed at the university as part of two European Commission IV Framework RTD projects that the authors are involved in. The underlying technology that is used is asymmetric encryption.…”
Section: The Public Key Infrastructurementioning
confidence: 99%
“…Such certificates are crucial for supporting public commerce using electronic means. For a cogent discussion of the value of digital signatures and the need for verifiable certificates nationwide see (Chokhani, 1994). …”
Section: Securing the Distribution Chainmentioning
confidence: 99%
“…Most see little wrong with borrowing their neighbor's software if they need it to complete some task. The end result is widespread software piracy, occasional lawsuits (Didio, 1993 ), and the loss of billions of dollars of revenue worldwide for publishers.…”
Section: Introductionmentioning
confidence: 99%