Modelling a public-key infrastructure
From MaRDI portal
Publication:5096419
DOI10.1007/3-540-61770-1_45zbMath1493.68046OpenAlexW1490838413MaRDI QIDQ5096419
Publication date: 16 August 2022
Published in: Computer Security — ESORICS 96 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-61770-1_45
trustcryptographykey managementprobabilistic logicdistributed system securitypublic-key certificationrecommendations
Cryptography (94A60) Probability and inductive logic (03B48) Distributed systems (68M14) Computer security (68M25)
Related Items (3)
LMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword search ⋮ Trust-Rated Authentication for Domain-Structured Distributed Systems ⋮ Using probabilistic argumentation for key validation in public-key cryptography
Cites Work
- Probability logic
- Valuation of trust in open networks
- A calculus for secure channel establishment in open networks
- Probabilistic logic
- Designing secure communication protocols from trust specifications
- New directions in cryptography
- A method for obtaining digital signatures and public-key cryptosystems
- A logic of authentication
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Modelling a public-key infrastructure