Towards logically and physically secure public-key infrastructures

1Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The bootstrapping of security mechanisms to large scale information systems is an important and critical exercise. It is conjectured that the design of bootstrapping procedure is effective, if every such bootstrapping procedure affects (or alters) the behaviour (represented by input data) of all system users (certificate authorities and the users of the public key infrastructure (PKI)). This paper aims to provide public verification for every use of certifying private keys, which are assumed to be stored in multiple physical locations. It provides abstract descriptions of protocols to achieve effective bootstrapping of security mechanisms to large scale PKIs.

Cite

CITATION STYLE

APA

Viswanathan, K., & Saxena, A. (2002). Towards logically and physically secure public-key infrastructures. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2551, pp. 122–134). Springer Verlag. https://doi.org/10.1007/3-540-36231-2_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free