Security infrastructure for electronic transactions

作者: Sead Muftic

DOI:

关键词:

摘要: A plurality of certification authorities connected by an open network are interrelated through authentication and system for providing managing public key certificates. The with its multiple policies constitute a infrastructure facilitating secure authentic transactions over unsecure network. Security services applications users in the facilitated set common functions accessible well-defined application programming interface which allows to be developed independently type underlying hardware platforms used, communication networks protocols security technologies.

参考文章(15)
Kannan Alagappan, Morrie Gasser, Charles W. Kaufman, Joseph J. Tardo, Butler W. Lampson, Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system ,(1992)
Gene Dr. Tsudik, Refik Dr. Molva, Authentication method and system with a smartcard ,(1992)
Stefan A. Brands, Secret-key certificates Department of Computer Science [CS]. pp. 1- 16 ,(1995)
Martin E. Hellman, Bailey W. Diffie, Ralph C. Merkle, Cryptographic apparatus and method ,(1977)
Martin E. Hellman, Stephen C. Pohlig, Exponentiation cryptographic apparatus and method ,(1978)
S. Chokhani, Toward a national public key infrastructure IEEE Communications Magazine. ,vol. 32, pp. 70- 74 ,(1994) , 10.1109/35.312846
Martin E. Hellman, Ralph C. Merkle, Public key cryptographic apparatus and method ,(1977)