[go: up one dir, main page]

Dawson et al., 2000 - Google Patents

Key management in a non-trusted distributed environment

Dawson et al., 2000

View PDF
Document ID
17265572790545215711
Author
Dawson E
Clark A
Looi M
Publication year
Publication venue
Future Generation Computer Systems

External Links

Snippet

Despite the fact that the World Wide Web is an untrusted environment, increasing use is being made of this network (the Internet) in electronic commerce applications. To prevent attacks a strong security architecture is required. A fundamental part of such an architecture …
Continue reading at eprints.qut.edu.au (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Humphrey et al. Security for grids
KR100827650B1 (en) How to authenticate potential members who are invited to join a group
US8670563B2 (en) System and method for designing secure client-server communication protocols based on certificateless public key infrastructure
Mangipudi et al. A secure identification and key agreement protocol with user anonymity (SIKA)
Zhang et al. BCAE: A blockchain-based cross domain authentication scheme for edge computing
Lim et al. A dynamic key infrastructure for GRID
Sharma et al. Nonce: Life cycle, issues and challenges in cryptography
Ghaffar et al. A lightweight and efficient remote data authentication protocol over cloud storage environment
Fan et al. Cake-puf: a collaborative authentication and key exchange protocol based on physically unclonable functions for industrial internet of things
Patil et al. A signcryption with identity-based authentication for secure EHR sharing in IoMT utilizing ECC
Dawson et al. Key management in a non-trusted distributed environment
Muftic et al. Security architecture for distributed systems
Veeresh et al. Identity-based encryption to implement anti-collusion information sharing schemes in cloud computing
Perrin et al. Delegated cryptography, online trusted third parties, and PKI
Chaudhary et al. Interoperable identity management protocol for multi-cloud platform
Shujing et al. Security analysis and improvements on a semi-quantum electronic voting protocol
Rajamanickam et al. Insider Attack Prevention: LAPUP—Lightweight Authentication Protocol Using PUF
Kim et al. A study on a secure single sign-on for user authentication information privacy in distributed computing environment
Goodrich et al. Notarized federated identity management for web services
Liu et al. Research on Attribute-Based Zero-Knowledge Proof Algorithm for Blockchain Accreditation
Li Research on key security detection method of cross domain information sharing based on pkg trust gateway
Haidar et al. Critical evaluation of current approaches to grid security
Ng et al. A novel JavaCard-based authentication system for secured transactions on the Internet
Das Secure resource sharing in grid system without public key settings
Ahn et al. Secure and Efficient maTLS with Proxy Signature Scheme