A comparison of schemes for certification authorities/Trusted Third Parties [chapter]

A. Rensburg, B. Solms
1997 Information Security in Research and Business  
A comparison of schemes employed by certification authorities or trusted third parties to generate certificates. This procedure is responsible for assigning a public key pair to the registered name of one user.
doi:10.1007/978-0-387-35259-6_18 fatcat:gtjkkb56cbfrzinucvdyu5grqq