Attributes | Values |
---|
rdf:type
| |
Description
| - Public key cryptography has become very popular recently. To use it securely, it is necessary to employ systems offering at least a basic set of functions associated with public key cryptosystems containing generation of keys, secure generation of certificates, verification of signatures, dissemination of revoked certificates, and so on. This paper demonstrates that the use of public key cryptography is not easy and it is very difficult to perform the above-mentioned actions in a way satisfying some preedefined security level. The reason is in the complexity of the problem. We are not generally able to ensure the usage of systems able to work with all existing algorithms, key lengths, and formats in the whole public key infrastructure. Also, some people are of the opinion that X.509 as a basis ofr PKI is obsolete.
- Public key cryptography has become very popular recently. To use it securely, it is necessary to employ systems offering at least a basic set of functions associated with public key cryptosystems containing generation of keys, secure generation of certificates, verification of signatures, dissemination of revoked certificates, and so on. This paper demonstrates that the use of public key cryptography is not easy and it is very difficult to perform the above-mentioned actions in a way satisfying some preedefined security level. The reason is in the complexity of the problem. We are not generally able to ensure the usage of systems able to work with all existing algorithms, key lengths, and formats in the whole public key infrastructure. Also, some people are of the opinion that X.509 as a basis ofr PKI is obsolete. (en)
|
Title
| - Real-World Problems of PKI Hierarchy
- Real-World Problems of PKI Hierarchy (en)
|
skos:prefLabel
| - Real-World Problems of PKI Hierarchy
- Real-World Problems of PKI Hierarchy (en)
|
skos:notation
| - RIV/00216305:26220/01:PU28691!RIV/2002/MSM/262202/N
|
http://linked.open.../vavai/riv/strany
| |
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/00216305:26220/01:PU28691
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - security, PKI, X.509, hierarchy, CRL (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...v/mistoKonaniAkce
| |
http://linked.open...i/riv/mistoVydani
| |
http://linked.open...i/riv/nazevZdroje
| - Proceedings of the SPI Conference
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...ocetUcastnikuAkce
| |
http://linked.open...nichUcastnikuAkce
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| |
http://linked.open...vavai/riv/typAkce
| |
http://linked.open.../riv/zahajeniAkce
| |
http://linked.open...n/vavai/riv/zamer
| |
number of pages
| |
http://purl.org/ne...btex#hasPublisher
| |
https://schema.org/isbn
| |
http://localhost/t...ganizacniJednotka
| |