Dawson et al., 2000 - Google Patents
Key management in a non-trusted distributed environmentDawson et al., 2000
View PDF- Document ID
- 17265572790545215711
- Author
- Dawson E
- Clark A
- Looi M
- Publication year
- Publication venue
- Future Generation Computer Systems
External Links
Snippet
Despite the fact that the World Wide Web is an untrusted environment, increasing use is being made of this network (the Internet) in electronic commerce applications. To prevent attacks a strong security architecture is required. A fundamental part of such an architecture …
- 238000003860 storage 0 abstract description 30
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Humphrey et al. | Security for grids | |
KR100827650B1 (en) | How to authenticate potential members who are invited to join a group | |
US8670563B2 (en) | System and method for designing secure client-server communication protocols based on certificateless public key infrastructure | |
Mangipudi et al. | A secure identification and key agreement protocol with user anonymity (SIKA) | |
Zhang et al. | BCAE: A blockchain-based cross domain authentication scheme for edge computing | |
Lim et al. | A dynamic key infrastructure for GRID | |
Sharma et al. | Nonce: Life cycle, issues and challenges in cryptography | |
Ghaffar et al. | A lightweight and efficient remote data authentication protocol over cloud storage environment | |
Fan et al. | Cake-puf: a collaborative authentication and key exchange protocol based on physically unclonable functions for industrial internet of things | |
Patil et al. | A signcryption with identity-based authentication for secure EHR sharing in IoMT utilizing ECC | |
Dawson et al. | Key management in a non-trusted distributed environment | |
Muftic et al. | Security architecture for distributed systems | |
Veeresh et al. | Identity-based encryption to implement anti-collusion information sharing schemes in cloud computing | |
Perrin et al. | Delegated cryptography, online trusted third parties, and PKI | |
Chaudhary et al. | Interoperable identity management protocol for multi-cloud platform | |
Shujing et al. | Security analysis and improvements on a semi-quantum electronic voting protocol | |
Rajamanickam et al. | Insider Attack Prevention: LAPUP—Lightweight Authentication Protocol Using PUF | |
Kim et al. | A study on a secure single sign-on for user authentication information privacy in distributed computing environment | |
Goodrich et al. | Notarized federated identity management for web services | |
Liu et al. | Research on Attribute-Based Zero-Knowledge Proof Algorithm for Blockchain Accreditation | |
Li | Research on key security detection method of cross domain information sharing based on pkg trust gateway | |
Haidar et al. | Critical evaluation of current approaches to grid security | |
Ng et al. | A novel JavaCard-based authentication system for secured transactions on the Internet | |
Das | Secure resource sharing in grid system without public key settings | |
Ahn et al. | Secure and Efficient maTLS with Proxy Signature Scheme |