[go: up one dir, main page]

Long et al., 1995 - Google Patents

Public/private key certification authority and key distribution. Draft

Long et al., 1995

View PDF
Document ID
16477462626749493266
Author
Long J
Christensen M
Sturtevant A
Johnston W
Publication year

External Links

Snippet

Traditional encryption, which protects messages from prying eyes, has been used for many decades. The present concepts of encryption are built from that heritage. Utilization of modern software-based encryption techniques implies much more than simply converting …
Continue reading at www.osti.gov (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications

Similar Documents

Publication Publication Date Title
JP5190036B2 (en) System and method for electronic transmission, storage and retrieval of authenticated documents
US7395436B1 (en) Methods, software programs, and systems for electronic information security
KR100455326B1 (en) Document authentication system and method
US8984601B2 (en) Enterprise security system
US6363365B1 (en) Mechanism for secure tendering in an open electronic network
US6745327B1 (en) Electronic certificate signature program
Stapleton Security without obscurity: A guide to confidentiality, authentication, and integrity
CA2305249A1 (en) Virtual safe
Sengupta et al. e-Commerce security—A life cycle approach
Smith Control and Security of E-commerce
Chokhani et al. RFC2527: Internet x. 509 Public Key Infrastructure Certificate Policy and Certification Practices Framework
Dosdale Security in EDIFACT systems
Long et al. Public/private key certification authority and key distribution. Draft
Gripman Electronic document certification: A primer on the technology behind digital signatures
Dawson et al. eTendering-security and legal issues
KACHHIA CHAPTER–17 E-COMMERCE SECURITY–A LIFE CYCLE APPROACH
SANDANAYAKE et al. An Overview of Online Transaction Technologies in E-Commerce
Cutler et al. Liberty identity assurance framework
Leitstelle OSCI-Transport 1.2
Sanayei et al. E-Commerce and Security Governance in Developing Countries
Sheet X. 509 Certificate Policy for the United States Department of Defense
Devikar Security issues in electronic data interchange (EDI) systems
Stoltz Guidelines for Reducing Audit Risk in an E-Commerce Environment with Specific Reference to Validity
Sharp Enterprise Information Assurance: Key Components.
Ang et al. Certificate based PKI and B2B E-commerce: suitable match or not?