Sciweavers

ACSAC
2001
IEEE
14 years 3 months ago
Restricting Access with Certificate Attributes in Multiple Root Environments-A Recipe for Certificate Masquerading
The issue of certificate masquerading against the SSL protocol is pointed out in [4]. In [4], various forms of server certificate masquerading are identified. It should also be no...
James M. Hayes
PKC
1998
Springer
126views Cryptology» more  PKC 1998»
14 years 3 months ago
Certifying Trust
A basic function of all signatures, digital or not, is to express trust and authority, explicit or implied. This is especially the case with digital signatures used in certificates...
Ilari Lehti, Pekka Nikander
ACSAC
2000
IEEE
14 years 4 months ago
A Novel Approach to On-Line Status Authentication of Public-Key Certificates
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
Eugenio Faldella, Marco Prandini
IFIP
2004
Springer
14 years 4 months ago
ATV: An Efficient Method for Constructing a Certification Path
: Constructing a certification path is the mainly method of validating a certificate at given time. The established path will consist of all the valid certificates that reside betw...
Omar Batarfi
EUROPKI
2007
Springer
14 years 5 months ago
Using WebDAV for Improved Certificate Revocation and Publication
There are several problems associated with the current ways that certificates are published and revoked. This paper discusses these problems, and then proposes a solution based on ...
David W. Chadwick, Sean Anthony