
References
- 1.M. Burmester, Y. Desmedt, and G. Kabatianskii. Trust and security: A new look at the Byzantine generals problem. In R. N. Wright and P. G. Neumann, editors, Network Threats, DIMACS, Series in Discrete Mathematics and Theoretical Computer Science, December 2-4, 1996, vol. 38. AMS, 1998.Google Scholar
- 2.M. Burmester and Y. Desmedt. Secure communication in an unknown network using certificates. In K. Y. Lam, E. Okamoto, and C. Xing, editors, Advances in Cryptology: Asiacrypt '99, Proceedings (Lecture Notes in Computer Science 1716), pages 274-287. Springer-Verlag, November 14-18, 1999, Singapore. Google Scholar
Digital Library
- 3.Cren's certificate authority service. http://www.cren.net/ca/index.html.Google Scholar
- 4.Cyber security budget initiatives. http://www.whitehouse.gov/WH/New/html/20000215_1.ht ml, February 15, 2000.Google Scholar
- 5.D. Dolev, C. Dwork, O. Waarts, and M. Yung. Perfectly secure message transmission. Journal of the ACM, 40(1):17-47, January 1993. Google Scholar
Digital Library
- 6.C. Ellison and B. Schneier. Ten risks of PKI: What you're not being told about Public Key Infrastructure. Computer Security Journal, 16(1):1-7, 2000. See also http://www.counterpane.com/pki-risks.html.Google Scholar
- 7.D. Goodenough. A Heretic's view of Certificates. www.DGA.co.uk/CredGoogle Scholar
- 8.M. K. Reiter and S. G. Stubblebine. Path independence for authentication in large scale systems. In Proceedings of the 4th ACM Conference on Computer and Communications Security, pages 57-66, April 1997, Zurich. Google Scholar
Digital Library
- 9.R. L. Rivest and B. Lampson. SDSI:a simple distributed security infrastructure. http://theory.lcs.mit.edu/~cis/sdsi.html.Google Scholar
- 10.P. R. Zimmermann. The Official PGP User's Guide. MIT Press, Cambridge, Massachusetts, 1995. Google Scholar
Digital Library
Index Terms
Which PKI (public key infrastructure) is the right one? (panel session)




Comments