1 |
M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams, 'X.509 Internet public key infrastructure on-line certificate status protocol (OCSP),' RFC 2560, (1999)
|
2 |
N. Asokan, G.Tsudik and M.Waidner, 'Server-Supported Signatures,' European Symposium on Research in Computer Security, pp.131-143, (1996)
|
3 |
P. McDaniel and S. Jamin, 'Windowed certificate revocation,' Proceedings of IEEE INFOCOM'2000, Tel-Aviv, Israel, pp.1406-1414, (2000)
|
4 |
S. Halevi and H. Krawczyk, 'Public-Key Cryptography And Password Protocols,' In 5th ACM Conference on Computer and Communication Security, San Francisco, California, pp.122-131, (1998)
|
5 |
Steven M. Bellovin, 'Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks,' Proceedings of the IEEE Symposium on research in Security and Privacy, Oakland, , pp.72-84, (1992)
|
6 |
Peter Buhler, Thomas Eirich, Michael Stenier and Michael Waidner, 'Secure Password-Based Cipher Suite For TLS,' In Symposium on Network and Distributed Systems Security (NDSS '00), pp.129-142, (2000)
|
7 |
M. Naor and K. Nissim, 'Certificate revocation and certificate update,' Proceedings 7th USENIX Security Symposium, San Antonio, Texas, pp.217-228, (1998)
|
8 |
D. Cooper, 'A more efficient use of delta-CRLs,' Proceeding of 2000 IEEE Symposium on Security and Privacy, pp.190-202, (2000)
|
9 |
R. Housley, W. Ford, W. Polk and D. Solo, 'Internet X.509 public key infrastructure certificate and CRL profile,' RFC 2459, (1999)
|
10 |
N. Haller, 'The S/Key One-time Password System,' Proceeding of ISOC Symposium on Network and Distributed System Security, pp.151-157, (1994)
|
11 |
J. Yang, W. Shin and K. Rhee, 'An end-to-end authentication protocol in Wireless Application Protocol,' ACISP 2001, LNCS 2119, pp.247-259, (2001)
|
12 |
S. Micali, 'Efficient Certificate revocation,' Technical Memo MIT/LCS/TM-542b, (1996)
|
13 |
C. Adams and S. Lloyd, 'Understanding public-key infrastructure: concepts, standard, and deployment considerations,' Indianapolis: Macmillan Technical Publishing, (1999)
|
14 |
J. Zhou, F. Bao and R. Deng, 'An Efficient Public-Key Framework,' 5th International Conference on Information and Communications Security, LNCS 2836, pp.88-99, (2003)
|