van Oorschot, 2021 - Google Patents
Public-key certificate management and use casesvan Oorschot, 2021
- Document ID
- 616927933925078747
- Author
- van Oorschot P
- Publication year
- Publication venue
- Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin
External Links
Snippet
This chapter explains certificate management and public-key infrastructure (PKI), what they  provide, technical mechanisms and architectures, and challenges. Two major certificate use  cases are also considered here as examples: TLS as used in HTTPS for secure browser … 
    - 102000036640 Cullin Ring E3 Ligases 0 description 16
Similar Documents
| Publication | Publication Date | Title | 
|---|---|---|
| US7992194B2 (en) | Methods and apparatus for identity and role management in communication networks | |
| Barker et al. | Recommendation for key management part 3: Application-specific key management guidance | |
| US9397839B2 (en) | Non-hierarchical infrastructure for managing twin-security keys of physical persons or of elements (IGCP/PKI) | |
| Todorov | Mechanics of user identification and authentication: Fundamentals of identity management | |
| US8984280B2 (en) | Systems and methods for automating certification authority practices | |
| US7146009B2 (en) | Secure electronic messaging system requiring key retrieval for deriving decryption keys | |
| US20060206433A1 (en) | Secure and authenticated delivery of data from an automated meter reading system | |
| US20060048210A1 (en) | System and method for policy enforcement in structured electronic messages | |
| Karbasi et al. | A post-quantum end-to-end encryption over smart contract-based blockchain for defeating man-in-the-middle and interception attacks | |
| JP4601470B2 (en) | E-mail transfer method and apparatus | |
| Yakubov et al. | BlockPGP: A blockchain-based framework for PGP key servers | |
| EP2372947A1 (en) | Secure and traceable digital transmission method and envelope | |
| GB2512324A (en) | Improvements in or relating to public-key certificate management | |
| Barker et al. | Sp 800-57. recommendation for key management, part 1: General (revised) | |
| Spies | Public key infrastructure | |
| US20070288746A1 (en) | Method of providing key containers | |
| Orman | Encrypted Email: The History and Technology of Message Privacy | |
| van Oorschot | Public-key certificate management and use cases | |
| Oh et al. | Cyber attack defense: DID-based email security system | |
| Hughes | Pro Active Directory Certificate Services | |
| Boeyen et al. | Liberty trust models guidelines | |
| Chokhani et al. | PKI and certificate authorities | |
| Patel et al. | Public key infrastructure for air traffic management systems | |
| Hansen | Public key infrastructure (PKI) interoperability: a security services approach to support transfer to trust | |
| Clark et al. | SoK: Securing Email--A Stakeholder-Based Analysis (Extended Version) |