Young et al., 1996
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| US20200304315A1 (en) | System and method for blockchain-based cross-entity authentication | |
| US9455978B2 (en) | System and method to enable PKI- and PMI- based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added | |
| US6539093B1 (en) | Key ring organizer for an electronic business using public key infrastructure | |
| US6957199B1 (en) | Method, system and service for conducting authenticated business transactions | |
| Kuhn et al. | Introduction to public key technology and the federal PKI infrastructure | |
| Garfinkel | Email-based identification and authentication: An alternative to PKI? | |
| US6363365B1 (en) | Mechanism for secure tendering in an open electronic network | |
| US7184988B1 (en) | Methods for operating infrastructure and applications for cryptographically-supported services | |
| McCorry et al. | Refund attacks on Bitcoin’s payment protocol | |
| US20030163686A1 (en) | System and method for ad hoc management of credentials, trust relationships and trust history in computing environments | |
| US20020162003A1 (en) | System and method for providing trusted browser verification | |
| CN110189184A (en) | A kind of electronic invoice storage method and device | |
| Onieva et al. | Secure multi-party non-repudiation protocols and applications | |
| Komar | Windows server 2008 PKI and Certificate security | |
| Yeh et al. | Applying lightweight directory access protocol service on session certification authority | |
| Gritzalis, D. Gritzalis, C. Moulinos, J. Iliadis | An integrated architecture for deploying a virtual private medical network over the Web | |
| Young et al. | Technologies to Support Authentication in Higher Education: A Study for the UK Joint Information Systems Committee, August 21th, 1996 | |
| Crispo et al. | WWW security and trusted third party services | |
| Rebstock et al. | Secure Interactive Electronic Negotiations in Business to Business Marketplaces | |
| Yildiz | A proposal for Turkish government public key infrastructure trust model | |
| van Oorschot | Changed the World | |
| Tsiakis et al. | Identification of trust requirements in an e-business framework. | |
| Yao | A security architecture for protecting dynamic components of mobile agents | |
| Kefallinos et al. | Secure PKI-enabled e-government infrastructures implementation: the SYZEFXIS-PKI case | |
| Tassabehji | Secure use of the Internet by business |