Skip to main content

Which PKI (Public Key Infrastructure) is the right one?

Publication ,  Conference
Adams, C; Burmester, M; Desmedt, Y; Reiter, M; Zimmermann, P
Published in: Proceedings of the ACM Conference on Computer and Communications Security
December 1, 2000

Experts are urged to delicate over what method to use and whether a Public Key Infrastructure (PKI) is needed when building an expensive infrastructure. Although X500/509 is one of the first PKI proposed, others are suggested. Some of the alternative structures proposed are briefly surveyed.

Duke Scholars

Published In

Proceedings of the ACM Conference on Computer and Communications Security

Publication Date

December 1, 2000

Start / End Page

98 / 101
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Adams, C., Burmester, M., Desmedt, Y., Reiter, M., & Zimmermann, P. (2000). Which PKI (Public Key Infrastructure) is the right one? In Proceedings of the ACM Conference on Computer and Communications Security (pp. 98–101).
Adams, C., M. Burmester, Y. Desmedt, M. Reiter, and P. Zimmermann. “Which PKI (Public Key Infrastructure) is the right one?” In Proceedings of the ACM Conference on Computer and Communications Security, 98–101, 2000.
Adams C, Burmester M, Desmedt Y, Reiter M, Zimmermann P. Which PKI (Public Key Infrastructure) is the right one? In: Proceedings of the ACM Conference on Computer and Communications Security. 2000. p. 98–101.
Adams, C., et al. “Which PKI (Public Key Infrastructure) is the right one?Proceedings of the ACM Conference on Computer and Communications Security, 2000, pp. 98–101.
Adams C, Burmester M, Desmedt Y, Reiter M, Zimmermann P. Which PKI (Public Key Infrastructure) is the right one? Proceedings of the ACM Conference on Computer and Communications Security. 2000. p. 98–101.

Published In

Proceedings of the ACM Conference on Computer and Communications Security

Publication Date

December 1, 2000

Start / End Page

98 / 101