Author of the publication

How Can I Trust an X.509 Certificate? An Analysis of the Existing Trust Approaches.

, , , , and . LCN, page 531-534. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling the Internet White Pages Service - the Directory Guardian., and . NDSS, The Internet Society, (1998)Authorisation in Grid computing.. Inf. Secur. Tech. Rep., 10 (1): 33-40 (2005)Using WebDAV for Improved Certificate Revocation and Publication., and . EuroPKI, volume 4582 of Lecture Notes in Computer Science, page 265-279. Springer, (2007)A novel approach to establish trust in verifiable credential issuers in Self-sovereign identity ecosystems using TRAIN., , and . Open Identity Summit, volume P-325 of LNI, page 27-38. Gesellschaft für Informatik e.V., (2022)Establishing Trust in SSI Verifiers., , , and . Open Identity Summit, volume P-335 of LNI, Gesellschaft für Informatik e.V., (2023)Recognition of Authority in Virtual Organisations., , and . TrustBus, volume 4657 of Lecture Notes in Computer Science, page 3-13. Springer, (2007)Boosting Usability for Protecting Online Banking Applications Against APTs., and . CCC, page 70-76. IEEE, (2016)The Trusted Attribute Aggregation Service (TAAS) - Providing an Attribute Aggregation Layer for Federated Identity Management., and . ARES, page 285-290. IEEE Computer Society, (2013)How Can I Trust an X.509 Certificate? An Analysis of the Existing Trust Approaches., , , , and . LCN, page 531-534. IEEE Computer Society, (2016)Know Your Customer: Opening a new bank account online using UAAF., , , , , , and . CCNC, page 1-2. IEEE, (2020)