Why have public key infrastructures failed so far?
Javier LópezRolf OppligerGünther PernulPublished in: Internet Res. (2005)
Keyphrases
- public key
- security model
- digital signature
- security analysis
- private key
- public key cryptography
- secret key
- signature scheme
- authentication protocol
- image authentication
- elliptic curve cryptography
- public key cryptosystem
- secure communication
- provably secure
- diffie hellman
- rfid tags
- database systems
- authentication scheme
- blind signature