Login / Signup
Security Vulnerabilities in the Trust-List PKI.
Simeon Xenitellis
Pita Jarupunphol
Published in:
Security and Management (2003)
Keyphrases
</>
security vulnerabilities
trust model
public key infrastructure
intrusion detection
dos attacks
unauthorized access
security policies
trust relationships
penetration testing
security properties
security mechanisms
public key
digital signature
database
data management