Publisher
Springer International Publishing
Reference19 articles.
1. Cooper, D.A: A closer look at revocation and key compromise in public key infrastructures.
https://pdfs.semanticscholar.org/a8bd/a8fc6090c9a73c9fe7a740e58aa4f9cfe51e.pdf
2. Xu, Z., Martin, K.M.: Dynamic user revocation and key refreshing for attribute-based encryption in cloud storage. In: 11th International IEEE Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2012)
3. https://www.owasp.org/index.php/Key_Management_Cheat_Sheet
4. http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-130.pdf
5. http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-133.pdf