Sciweavers

CMS
2001
133views Communications» more  CMS 2001»
14 years 8 days ago
Asynchronous Large-Scale Certification Based on Certificate Verification Trees
Good public-key infrastructures (PKIs) are essential to make electronic commerce secure. Quite recently, certificate verification trees (CVTs) have been introduced as a tool for im...
M. Mar Albà, Josep Domingo-Ferrer, Francesc...
CMS
2001
119views Communications» more  CMS 2001»
14 years 8 days ago
Vulnerabilities and Security Limitations of current IP Telephony Systems
Abstract Within the traditional telephone system a certain level of quality and security has been established over the years. If we try to use IP Telephony systems as a core part o...
Ralf Ackermann, Markus Schumacher, Utz Roedig, Ral...