Author of the publication

Towards Certificate Verification in a Certificate Management System.

, , , and . ACSC, page 150-157. IEEE Computer Society, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Planar polynomials for commutative semifields with specified nuclei., , and . Des. Codes Cryptogr., 44 (1-3): 275-286 (2007)On a conjecture on planar polynomials of the form X(Trn(X)-uX)., and . Finite Fields Their Appl., (2013)Formalizing certificate management systems., , , and . ICON, page 340-348. IEEE, (1999)Applications of Linearised and Sub-linearised Polynomials to Information Security.. ACISP, volume 1438 of Lecture Notes in Computer Science, page 227-237. Springer, (1998)Applications of Trusted Review to Information Security., and . ACISP, volume 2119 of Lecture Notes in Computer Science, page 305-319. Springer, (2001)Towards Certificate Verification in a Certificate Management System., , , and . ACSC, page 150-157. IEEE Computer Society, (2000)Planning Security Services for IT Systems., and . CoRR, (2014)Modelling Trust Structures for Public Key Infrastructures., , , and . ACISP, volume 2384 of Lecture Notes in Computer Science, page 56-70. Springer, (2002)The PKI Specification Dilemma: A Formal Solution., , , and . ACISP, volume 1841 of Lecture Notes in Computer Science, page 206-219. Springer, (2000)A class of functions and their application in constructing semi-biplanes and association schemes., and . Discret. Math., 202 (1-3): 21-31 (1999)