[go: up one dir, main page]

van Oorschot, 2021 - Google Patents

Public-key certificate management and use cases

van Oorschot, 2021

Document ID
616927933925078747
Author
van Oorschot P
Publication year
Publication venue
Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin

External Links

Snippet

This chapter explains certificate management and public-key infrastructure (PKI), what they provide, technical mechanisms and architectures, and challenges. Two major certificate use cases are also considered here as examples: TLS as used in HTTPS for secure browser …
Continue reading at link.springer.com (other versions)

Similar Documents

Publication Publication Date Title
US7992194B2 (en) Methods and apparatus for identity and role management in communication networks
Barker et al. Recommendation for key management part 3: Application-specific key management guidance
US9397839B2 (en) Non-hierarchical infrastructure for managing twin-security keys of physical persons or of elements (IGCP/PKI)
Todorov Mechanics of user identification and authentication: Fundamentals of identity management
US8984280B2 (en) Systems and methods for automating certification authority practices
US7146009B2 (en) Secure electronic messaging system requiring key retrieval for deriving decryption keys
US20060206433A1 (en) Secure and authenticated delivery of data from an automated meter reading system
US20060048210A1 (en) System and method for policy enforcement in structured electronic messages
Karbasi et al. A post-quantum end-to-end encryption over smart contract-based blockchain for defeating man-in-the-middle and interception attacks
JP4601470B2 (en) E-mail transfer method and apparatus
Yakubov et al. BlockPGP: A blockchain-based framework for PGP key servers
EP2372947A1 (en) Secure and traceable digital transmission method and envelope
GB2512324A (en) Improvements in or relating to public-key certificate management
Barker et al. Sp 800-57. recommendation for key management, part 1: General (revised)
Spies Public key infrastructure
US20070288746A1 (en) Method of providing key containers
Orman Encrypted Email: The History and Technology of Message Privacy
van Oorschot Public-key certificate management and use cases
Oh et al. Cyber attack defense: DID-based email security system
Hughes Pro Active Directory Certificate Services
Boeyen et al. Liberty trust models guidelines
Chokhani et al. PKI and certificate authorities
Patel et al. Public key infrastructure for air traffic management systems
Hansen Public key infrastructure (PKI) interoperability: a security services approach to support transfer to trust
Clark et al. SoK: Securing Email--A Stakeholder-Based Analysis (Extended Version)