Which PKI (Public Key Infrastructure) is the right one?
Publication
, Conference
Adams, C; Burmester, M; Desmedt, Y; Reiter, M; Zimmermann, P
Published in: Proceedings of the ACM Conference on Computer and Communications Security
December 1, 2000
Experts are urged to delicate over what method to use and whether a Public Key Infrastructure (PKI) is needed when building an expensive infrastructure. Although X500/509 is one of the first PKI proposed, others are suggested. Some of the alternative structures proposed are briefly surveyed.
Duke Scholars
Published In
Proceedings of the ACM Conference on Computer and Communications Security
Publication Date
December 1, 2000
Start / End Page
98 / 101
Citation
APA
Chicago
ICMJE
MLA
NLM
Adams, C., Burmester, M., Desmedt, Y., Reiter, M., & Zimmermann, P. (2000). Which PKI (Public Key Infrastructure) is the right one? In Proceedings of the ACM Conference on Computer and Communications Security (pp. 98–101).
Adams, C., M. Burmester, Y. Desmedt, M. Reiter, and P. Zimmermann. “Which PKI (Public Key Infrastructure) is the right one?” In Proceedings of the ACM Conference on Computer and Communications Security, 98–101, 2000.
Adams C, Burmester M, Desmedt Y, Reiter M, Zimmermann P. Which PKI (Public Key Infrastructure) is the right one? In: Proceedings of the ACM Conference on Computer and Communications Security. 2000. p. 98–101.
Adams, C., et al. “Which PKI (Public Key Infrastructure) is the right one?” Proceedings of the ACM Conference on Computer and Communications Security, 2000, pp. 98–101.
Adams C, Burmester M, Desmedt Y, Reiter M, Zimmermann P. Which PKI (Public Key Infrastructure) is the right one? Proceedings of the ACM Conference on Computer and Communications Security. 2000. p. 98–101.
Published In
Proceedings of the ACM Conference on Computer and Communications Security
Publication Date
December 1, 2000
Start / End Page
98 / 101