Abstract
A comparison of schemes employed by certification authorities or trusted third parties to generate certificates.
Chapter PDF
Similar content being viewed by others
Keywords
References
Abad Peiro, J Asokan, N Waidner, M (1996) Payment Manager - Overview. SEMPER Activity Paper 212ZR054 <www.semper:zurich.ibm.com/info/212ZR054.ps.gz">
Amorosso, E (19XX) Fundamentals of computer security technology
Burton, S Kaliski, Jr (1993) An Overview of the PKCS Standards. RSA Laboratories <www.rsa.com/pub/pkcs/doc or www.rsa.com/pub/pkcs/ps/"#x003E;
European Commission DG-XIII.B.6 Infosec 94 - Phase II (1995) TESTFIT - TTP & Electronic Signature Trial For Inter-modal Transport
Europay International (1994) IC Card Specifications for Payment Systems - Part 3 IBM (1996) Internet Security Policy and Directives
IBM (1992) Transaction Security System Concepts and Programming Guide: Volume I, Access Controls and DES Cryptography GC31–3937
IBM (1992) Transaction Security System Concept and Programming Guide: Volume II, Public-Key Cryptography GC31–2889
Janson, P Waidner, M (1996) Electronic Payment Systems. SEMPER Activity Paper 211ZR018 <www.semper.zurich.ibm.com/info/211ZR018.ps.gz>
MasterCard Visa (1996) Secure Electronic Transaction (SET) Specification Book 1: Business Description
MasterCard Visa (1996) Secure Electronic Transaction (SET) Specification Book 2: Programmer’s Guide
Schneier, B (1994) Applied cryptography. John Wiley & Sons, Inc
Tsudik, G (1996) Zurich iKP Prototype (ZiP): Protocol Specification Document. IBM Zurich Research. <http://www.zurich.ibm.com/Technology/Security/Technology/Security>
VeriSign (1996) Certification Practice Statement. VeriSign < www.verisign.com>
Zimmermann, P (1993) Pretty Good Privacy Public Key Encryption for the Masses: PGP User’s Guide
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1997 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
van Rensburg, A., von Solms, B. (1997). A comparison of schemes for certification authorities/Trusted Third Parties. In: Yngström, L., Carlsen, J. (eds) Information Security in Research and Business. IFIP — The International Federation for Information Processing. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35259-6_18
Download citation
DOI: https://doi.org/10.1007/978-0-387-35259-6_18
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5481-0
Online ISBN: 978-0-387-35259-6
eBook Packages: Springer Book Archive