A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
A comparison of schemes for certification authorities/Trusted Third Parties
[chapter]
1997
Information Security in Research and Business
A comparison of schemes employed by certification authorities or trusted third parties to generate certificates. This procedure is responsible for assigning a public key pair to the registered name of one user.
doi:10.1007/978-0-387-35259-6_18
fatcat:gtjkkb56cbfrzinucvdyu5grqq