Abstract. The absence of manageable global key distribution schemes is seriously hindering the deployment of basic security services in the In-ternet. The emergence of cryptosystems based on public key technology has represented a signicant improvement in this direction by removing the need of a mutual agreement on the encryption key. However, the certi cate structures that bind a user to his public key are dicult to deploy especially in inter-domain environments. As a consequence, al-though the need for security services like encryption or authentication is becoming crucial, most Internet transactions currently take place with-out the use of any of these services. This paper proposes a novel approach for simplifying key manageability relyi...
. This paper is concerned with key escrow protocols for use in international communications environm...
This paper studies the issues of flexibility and scalability in the context of network security. In ...
Defensive techniques against Internet-scale attacks can signicantly benet from sharing network secu...
We revisit the problem of secure cross-domain communication between two users belonging to different...
We revisit the problem of secure cross-domain communication between two users belonging to different...
. In this paper we present a key escrow system which meets possible requirements for international k...
As the use of the Internet for electronic commerce, audio and video conferencing, and other applicat...
In global networks, reliable distribution of public keys for authentication and encryption purposes ...
Combined public and secret key cryptographic techniques have merged the advantages of both technique...
As the use of the Internet for electronic commerce, audio and video conferencing, and other applicat...
Abstract: The problem of efficiently and securely broadcasting to the remote cooperative group occur...
Despite the fact that the World Wide Web is an untrusted environment, increasing use is being made o...
Abstract: One of the major problems of security framework is related to key distribution and managem...
This paper describes the basic architecture of an authentication service for distributed systems in ...
Abstract. We present an authentication scheme and new protocol for domain-based scenarios with inter...
. This paper is concerned with key escrow protocols for use in international communications environm...
This paper studies the issues of flexibility and scalability in the context of network security. In ...
Defensive techniques against Internet-scale attacks can signicantly benet from sharing network secu...
We revisit the problem of secure cross-domain communication between two users belonging to different...
We revisit the problem of secure cross-domain communication between two users belonging to different...
. In this paper we present a key escrow system which meets possible requirements for international k...
As the use of the Internet for electronic commerce, audio and video conferencing, and other applicat...
In global networks, reliable distribution of public keys for authentication and encryption purposes ...
Combined public and secret key cryptographic techniques have merged the advantages of both technique...
As the use of the Internet for electronic commerce, audio and video conferencing, and other applicat...
Abstract: The problem of efficiently and securely broadcasting to the remote cooperative group occur...
Despite the fact that the World Wide Web is an untrusted environment, increasing use is being made o...
Abstract: One of the major problems of security framework is related to key distribution and managem...
This paper describes the basic architecture of an authentication service for distributed systems in ...
Abstract. We present an authentication scheme and new protocol for domain-based scenarios with inter...
. This paper is concerned with key escrow protocols for use in international communications environm...
This paper studies the issues of flexibility and scalability in the context of network security. In ...
Defensive techniques against Internet-scale attacks can signicantly benet from sharing network secu...