Zobrazeno 1 - 10
of 45
pro vyhledávání: '"Selwyn Russell"'
Autor:
Selwyn Russell
Publikováno v:
International Journal of Information Security. 2:78-90
Processing of a set of multi-level digital certificates, particularly path construction and validation, can be excessively resource consuming, and even impractical in some cases. This article introduces classifications of certificate sets as “minim
Publikováno v:
Computer Communications. 26:1826-1838
The certificate paradigm is applied recursively to obtain the public keys of a number of Certification Authorities and, accordingly, to obtain the public keys of a number of final entities. Thus, validation of the authorized public key of a party in
Autor:
Selwyn Russell
Publikováno v:
ACM SIGSAC Review. 15:11-14
Digital multisignatures improve security of digital signatures and reduce fraud by collusion. ISO 9796 is specified for a single signer only. This letter explains how multisignatures may be incorporated, including alterations to the key generation al
Autor:
Selwyn Russell
Publikováno v:
EDPACS. 21:6-15
(1994). Controlling Separation of Duties to Prevent Document Fraud. EDPACS: Vol. 21, No. 12, pp. 6-15.
Autor:
Selwyn Russell
Publikováno v:
Computers & Security. 13:59-67
The problem of verifying authorization of source of an electronic document was raised in the IEEE Outstanding Paper of 1990. In this paper, a solution was proposed allowing a recipient to verify that a received electronic document not only came from
Autor:
Selwyn Russell
Publikováno v:
ACM SIGSMALL/PC Notes. 18:9-12
Implementation of modern cryptography needs both normal and modular arithmetic using numbers with hundreds of digits. This is often a discouragement to the use of such methods, even though a number of public domain packages are available. This paper
Autor:
Selwyn Russell
Publikováno v:
Intelligence and Security Informatics ISBN: 9783540344780
ISI
ISI
The Internet has certain properties which make it the first choice for communications during an emergency. Experiences during the Kobe earthquake in 1995 indicated that the Internet was more resilient than other networks [1].Fault tolerance and fault
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::de806c149c359529aaf70f6fdd8da753
https://doi.org/10.1007/11760146_98
https://doi.org/10.1007/11760146_98
Publikováno v:
Information Security and Privacy ISBN: 9783540265474
ACISP
ACISP
In this paper we introduce a new infrastructural approach to providing mobile agent execution integrity, a very important property – especially to the confidence an agent user can place in the results of its deployed autonomous mobile agents. Exist
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::72e323bae7e41fe6fd4f2c825e1962d9
https://doi.org/10.1007/11506157_15
https://doi.org/10.1007/11506157_15
Autor:
Selwyn Russell
Publikováno v:
Public Key Infrastructure ISBN: 9783540222163
EuroPKI
EuroPKI
Path discovery and path building in large scale certificate based infrastructures can be difficult and a hindrance to secure electronic communications. The recursive certificate structure can eliminate or greatly alleviate these problems. This paper
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e8885b1b9e0fd3409639c0b6a0458874
https://doi.org/10.1007/978-3-540-25980-0_11
https://doi.org/10.1007/978-3-540-25980-0_11
Publikováno v:
Information and Communications Security ISBN: 9783540235637
ICICS
ICICS
The autonomous capabilities of Internet mobile agents are one of their great attractions, yet leave them at the mercy of ill-intending agent platforms. We have devised an infrastructural strategy that allows mobile agent users to delegate responsibil
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1b92b3fb355d82db69793c711b50e1c0
https://doi.org/10.1007/978-3-540-30191-2_27
https://doi.org/10.1007/978-3-540-30191-2_27