Login / Signup
Trust coercion in the name of usable public key infrastructure.
Dimitrios Zissis
Dimitrios Lekkas
Published in:
Secur. Commun. Networks (2014)
Keyphrases
</>
public key infrastructure
digital signature
key technologies
public key
security mechanisms
public key cryptography
application development
trust model
security policies
information exchange
smart card
trust relationships
digital images
security issues