Why have public key infrastructures failed so far?, Internet Research, vol.15, issue.5, pp.544-556, 2005. ,
DOI : 10.1007/BFb0055482
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.330.7734
PKI: it's not dead, just resting, Computer, vol.35, issue.8, pp.41-49, 2002. ,
DOI : 10.1109/MC.2002.1023787
Information Technology -Open Systems Interconnection -The Directory: Public-key and Attribute Certificate Frameworks, 2000. ,
VeriSign Certification Practice Statement Version 3, 2009. ,
Towards a framework for evaluating certificate status information mechanisms, Computer Communications, vol.26, issue.16, pp.1839-1850, 2003. ,
DOI : 10.1016/S0140-3664(03)00079-3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.4411
Efficient Certificate Revocation, Massachusetts Institute of Technology, 1996. ,
NOVOMODO: Scalable Certificate Validation and Simplified PKI Management, 2002. ,
Using OCSP to Secure Certificate-Using Transactions in M-commerce, p.ACNS, 2003. ,
MBS-OCSP: an OCSP based certificate revocation system for wireless environments, Proceedings of the Fourth IEEE International Symposium on Signal Processing and Information Technology, 2004., 2004. ,
DOI : 10.1109/ISSPIT.2004.1433737
Fast digital identity revocation, p.CRYPTO, 1998. ,
DOI : 10.1007/BFb0055725
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.3886
On certificate revocation and validation, In: Financial Cryptography, 1998. ,
DOI : 10.1007/BFb0055481
Certificate revocation and certificate update, IEEE Journal on Selected Areas in Communications, vol.18, issue.4, 1998. ,
DOI : 10.1109/49.839932
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.109.5235
Certificate Revocation Using Fine Grained Certificate Space Partitioning, In: Financial Cryptography and Data Security, 2007. ,
DOI : 10.1007/978-3-540-77366-5_24
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.87.5123
Instant Revocation, European PKI workshop on Public Key Infrastructure: Theory and Practice, 2008. ,
DOI : 10.1007/978-3-540-69485-4_3
Beacon certificate push revocation, Proceedings of the 2nd ACM workshop on Computer security architectures, CSAW '08, 2008. ,
DOI : 10.1145/1456508.1456519
PKI without Revocation Checking, In: PKI R&D Workshop, 2005. ,
PKI past, present and future, International Journal of Information Security, vol.26, issue.16, pp.18-29, 2006. ,
DOI : 10.1109/MC.2002.1023787
On the Performance of Certificate Validation Schemes Based on Pre-Computed Responses, IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference, p.GLOBECOM, 2007. ,
DOI : 10.1109/GLOCOM.2007.42
Tradeoffs in certificate revocation schemes, ACM SIGCOMM Computer Communication Review, vol.33, issue.2, pp.103-112, 2003. ,
DOI : 10.1145/956981.956991
Evaluation of certificate validation mechanisms, Computer Communications, vol.29, issue.3, pp.291-305, 2006. ,
DOI : 10.1016/j.comcom.2004.12.008
Fractal hash sequence representation and traversal, Proceedings IEEE International Symposium on Information Theory,, pp.437-444, 2002. ,
DOI : 10.1109/ISIT.2002.1023709
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.8174