Managing Trusted Keys in Internet-Scale Systems

Bellevue, WA, 2009, Pages 153-156E.

Cited by: 7|Views5
EI WOS

Abstract:

This paper considers a fundamental problem facing all applications that rely on public key cryptography: how to obtain, verify, and maintain the set of trusted public keys. Without some notion of where to find the right keys or which keys can be trusted, an adversary can create false keys, trick users into accepting the false keys, and im...More

Code:

Data:

Get fulltext within 24h
Bibtex
Your rating :
0

 

Tags
Comments