[1]
|
Diffie, W. and Hellman, M.E. (1976) New Directions in Cryptography. IEEE Transactions on Information Theory, IT-22, 644-654.
|
[2]
|
Kohnfelder, L.M. (1978) Towards a Practical Public Key Cryptosystem. MIT S.B. Thesis, Massachusetts Institute of Technology, Cambridge.
|
[3]
|
ITU-T (1993) The Directory—Overview of Concepts, Models and Service. X.500 Series of Recommen-
dations, International Telecommunications Union, Geneva.
|
[4]
|
Ford, W. (1998) Public Key Infrastructure Interoperation. IEEE Aerospace Conference, 21-28 March 1998, Snowmass at Aspen, Vol. 4, 329-333.
|
[5]
|
Chokhani, S. (1994) Toward a National Public Key Infrastructure. IEEE Communications Magazine, 32, 70-74.
|
[6]
|
Wang, K.F. and Zhang, Z.H. (2010) Design and Implementation of a Safe Public Key Infrastructure. International Conference on Future Information Technology and Management Engineering (FITME), Changzhou, 9-10 October 2010, 298-301.
|
[7]
|
Fongen, A. (2010) Optimization of a Public Key Infrastructure. Military Communications Conference (MILCOM), Baltimore, 7-10 November 2011, 1440-1447.
|
[8]
|
Wing, P. and O’higgins, B. (1999) Using Public Key Infrastructures for Security and Risk Management. IEEE Communications Magazine, 37, 71-73.
|
[9]
|
Polk, W., Hastings, N. and Malpani, A. (2003) Public Key Infrastructures That Satisfy Security Goals. IEEE Internet Computing, 7, 60-67.
|
[10]
|
Dankers, J., Garefalakis, T., Schaffelhofer, R. and Wright, T. (2002) Public Key Infrastructure in Mobile Systems. IEEE Electronics and Communications Engineering Journal, 14, 180-190.
|
[11]
|
Slagell, A., Bonilla, R. and Yurcik, W. (2006) A Survey of PKI Components and Scalability Issues. 25th IEEE Performance, Computing, and Communications Conference, Phoenix, 10-12 April 2006, 10 p.
|
[12]
|
Vacca, J. (2013) Public Key Infrastructure. In: Cyber Security and IT Infrastructure Protection, Steven Elliot, Waltham, 75-107.
|
[13]
|
Balachandra, M., Krishna, P. and Shashank, S. (2012) Wireless Public Key Infrastructure for Mobile Phones. International Journal of Network Security and Its Applications (IJNSA), 4, 111-118.
|
[14]
|
Toorani, M. and Beheshti, A. (2008) LPKI—A Lightweight Public Key Infrastructure for the Mobile Environments. 11th IEEE International Conference on Communication Systems, Guangzhou, 19-21 November 2008, 162-166.
|
[15]
|
Kar, J. (2014) A Novel Construction of Certificateless Signcryption Scheme for Smart Card. In: Case Studies in Secure Computing Achievements and Trends, CRC Press, Taylor and Francis, New York, Chapter-22, 437-456.
|
[16]
|
Kar, J. (2014) Provably Secure Online/Off-Line Identity-Based Signature Scheme for Wireless Sensor Network. International Journal of Network Security, 16, 26-36.
|
[17]
|
Kar, J. (2013) ID-Based Deniable Authentication Protocol Based on Diffie-Hellman Problem on Elliptic Curve. International Journal of Network Security, 15, 347-354.
|
[18]
|
Kar, J. (2014) Authenticated Multiple-Key Establishment Protocol for Wireless Sensor Networks. In: Case Studies in Secure Computing Achievements and Trends, CRC Press, Taylor and Francis, New York, Chapter-04, 67-88.
|