Long et al., 1995 - Google Patents
Public/private key certification authority and key distribution. DraftLong et al., 1995
View PDF- Document ID
- 16477462626749493266
- Author
- Long J
- Christensen M
- Sturtevant A
- Johnston W
- Publication year
External Links
Snippet
Traditional encryption, which protects messages from prying eyes, has been used for many decades. The present concepts of encryption are built from that heritage. Utilization of modern software-based encryption techniques implies much more than simply converting …
- 238000009826 distribution 0 title description 5
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5190036B2 (en) | System and method for electronic transmission, storage and retrieval of authenticated documents | |
US7395436B1 (en) | Methods, software programs, and systems for electronic information security | |
KR100455326B1 (en) | Document authentication system and method | |
US8984601B2 (en) | Enterprise security system | |
US6363365B1 (en) | Mechanism for secure tendering in an open electronic network | |
US6745327B1 (en) | Electronic certificate signature program | |
Stapleton | Security without obscurity: A guide to confidentiality, authentication, and integrity | |
CA2305249A1 (en) | Virtual safe | |
Sengupta et al. | e-Commerce security—A life cycle approach | |
Smith | Control and Security of E-commerce | |
Chokhani et al. | RFC2527: Internet x. 509 Public Key Infrastructure Certificate Policy and Certification Practices Framework | |
Dosdale | Security in EDIFACT systems | |
Long et al. | Public/private key certification authority and key distribution. Draft | |
Gripman | Electronic document certification: A primer on the technology behind digital signatures | |
Dawson et al. | eTendering-security and legal issues | |
KACHHIA | CHAPTER–17 E-COMMERCE SECURITY–A LIFE CYCLE APPROACH | |
SANDANAYAKE et al. | An Overview of Online Transaction Technologies in E-Commerce | |
Cutler et al. | Liberty identity assurance framework | |
Leitstelle | OSCI-Transport 1.2 | |
Sanayei et al. | E-Commerce and Security Governance in Developing Countries | |
Sheet | X. 509 Certificate Policy for the United States Department of Defense | |
Devikar | Security issues in electronic data interchange (EDI) systems | |
Stoltz | Guidelines for Reducing Audit Risk in an E-Commerce Environment with Specific Reference to Validity | |
Sharp | Enterprise Information Assurance: Key Components. | |
Ang et al. | Certificate based PKI and B2B E-commerce: suitable match or not? |