Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference61 articles.
1. Adams, C., Lloyd, S.: Understanding PKI: Concepts, Standards, and Deployment Considerations. Addison-Wesley Professional, Boston (2003)
2. Nechvatal,J.: Public-key cryptography. Tech. Rep. NIST Special Publication 800-2, National Institute of Standards & Technology, Research Information Center, Gaithersburg, MD 20899 (1991)
3. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120 (1978). https://doi.org/10.1145/359340.359342
4. Vacca, J.R.: Public Key Infrastructure: Building Trusted Applications and Web Services. Auerbach Publications, New York (2004)
5. Adkins, H.: Google online security blog: an update on attempted man-in-the-middle attacks. https://security.googleblog.com/2011/08/update-on-attempted-man-in-middle.html (2011). Accessed 20 Oct 2018
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献