skip to main content
Skip header Section
The official PGP user's guideMay 1995
Publisher:
  • MIT Press
  • 55 Hayward St.
  • Cambridge
  • MA
  • United States
ISBN:978-0-262-74017-3
Published:05 May 1995
Pages:
127
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Khan S, Luo F, Zhang Z, Ullah F, Amin F, Qadri S, Heyat M, Ruby R, Wang L, Ullah S, Li M, Leung V and Wu K (2023). A Survey on X.509 Public-Key Infrastructure, Certificate Revocation, and Their Modern Implementation on Blockchain and Ledger Technologies, IEEE Communications Surveys & Tutorials, 25:4, (2529-2568), Online publication date: 1-Oct-2023.
  2. Yadav T, Gosain D and Seamons K Cryptographic deniability Proceedings of the 32nd USENIX Conference on Security Symposium, (3637-3654)
  3. ACM
    Bradbury M, Prince D, Marcinkiewicz V and Watson T Attributes and Dimensions of Trust in Secure Systems Proceedings of the 12th International Conference on the Internet of Things, (179-186)
  4. Jeon S, Shin C, Ko E and Moon J (2022). A security scheme for distributing analysis codes supporting CDM-based research in a multi-center environment, Computer Methods and Programs in Biomedicine, 226:C, Online publication date: 1-Nov-2022.
  5. ACM
    Halpin H All that is Solid Melts into Air: Towards Decentralized Cryptographic Access Control Proceedings of the 17th International Conference on Availability, Reliability and Security, (1-6)
  6. Khan S, Luo F, Zhang Z, Rahim M, Ahmad M and Wu K (2022). Survey on Issues and Recent Advances in Vehicular Public-Key Infrastructure (VPKI), IEEE Communications Surveys & Tutorials, 24:3, (1574-1601), Online publication date: 1-Jul-2022.
  7. ACM
    Meurisch C and Mühlhäuser M (2021). Data Protection in AI Services, ACM Computing Surveys, 54:2, (1-38), Online publication date: 31-Mar-2022.
  8. Schaerer J, Zumbrunn S and Braun T (2022). Veritaa, International Journal of Network Management, 32:2, Online publication date: 10-Mar-2022.
  9. Madl T Security Concept with Distributed Trust-Levels for Autonomous Cooperative Vehicle Networks 2021 IEEE Intelligent Vehicles Symposium (IV), (321-328)
  10. Shafagh H, Burkhalter L, Ratnasamy S and Hithnawi A Droplet Proceedings of the 29th USENIX Conference on Security Symposium, (2469-2486)
  11. Vazquez Sandoval I and Lenzini G A Formal Security Analysis of the Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email Emerging Technologies for Authorization and Authentication, (171-187)
  12. Jiang W, Li H, Xu G, Wen M, Dong G and Lin X (2022). PTAS, Future Generation Computer Systems, 96:C, (185-195), Online publication date: 1-Jul-2019.
  13. ACM
    Buccafurri F, Musarella L and Nardone R Enabling propagation in web of trust by Ethereum Proceedings of the 23rd International Database Applications & Engineering Symposium, (1-6)
  14. Karati A and Biswas G (2018). Provably secure and authenticated data sharing protocol for IoT‐based crowdsensing network, Transactions on Emerging Telecommunications Technologies, 30:4, Online publication date: 15-Apr-2019.
  15. Jiang W, Li H, Xu G, Wen M, Dong G and Lin X A Privacy-Preserving Thin-Client Scheme in Blockchain-Based PKI 2018 IEEE Global Communications Conference (GLOBECOM), (1-6)
  16. ACM
    Kulynych B, Lueks W, Isaakidis M, Danezis G and Troncoso C ClaimChain Proceedings of the 2018 Workshop on Privacy in the Electronic Society, (86-103)
  17. Taher P, Boloorchi A and Samadzadeh M (2018). Age-based anonymity, Telecommunications Systems, 69:2, (223-235), Online publication date: 1-Oct-2018.
  18. ACM
    Alexopoulos N, Habib S and Mühlhäuser M Towards Secure Distributed Trust Management on a Global Scale Proceedings of the 2018 Workshop on IoT Security and Privacy, (49-54)
  19. Nguyen H, Eisenbarth J, Ignat C and Perrin O Blockchain-Based Auditing of Transparent Log Servers Data and Applications Security and Privacy XXXII, (21-37)
  20. ACM
    Guberek T, McDonald A, Simioni S, Mhaidli A, Toyama K and Schaub F Keeping a Low Profile? Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, (1-15)
  21. (2018). Efficient deterministic and non-deterministic pseudorandom number generation, Mathematics and Computers in Simulation, 143:C, (114-124), Online publication date: 1-Jan-2018.
  22. ACM
    Alexopoulos N On enhancing trust in cryptographic solutions Proceedings of the Symposium on Applied Computing, (1848-1849)
  23. Karati A and Biswas G (2016). Efficient and provably secure random oracle-free adaptive identity-based encryption with short-signature scheme, Security and Communication Networks, 9:17, (4060-4074), Online publication date: 25-Nov-2016.
  24. Tschorsch F and Scheuermann B (2016). Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies, IEEE Communications Surveys & Tutorials, 18:3, (2084-2123), Online publication date: 1-Jul-2016.
  25. Djamaludin C, Foo E, Camtepe S and Corke P (2016). Revocation and update of trust in autonomous delay tolerant networks, Computers and Security, 60:C, (15-36), Online publication date: 1-Jul-2016.
  26. Taly A and Shankar A Distributed Authorization in Vanadium Tutorial Lectures on Foundations of Security Analysis and Design VIII - Volume 9808, (139-162)
  27. Memarmoshrefi P, Seibel R and Hogrefe D (2016). Autonomous Ant-based Public Key Authentication Mechanism for Mobile Ad-hoc Networks, Mobile Networks and Applications, 21:1, (149-160), Online publication date: 1-Feb-2016.
  28. ACM
    Gilbert S and Zheng C (2015). SybilCast, ACM Transactions on Parallel Computing, 2:3, (1-20), Online publication date: 2-Nov-2015.
  29. Amour L and Petullo W Improving Application Security through TLS-Library Redesign Proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering - Volume 9354, (75-94)
  30. McGregor S, Charters P, Holliday T and Roesner F Investigating the computer security practices and needs of journalists Proceedings of the 24th USENIX Conference on Security Symposium, (399-414)
  31. Melara M, Blankstein A, Bonneau J, Felten E and Freedman M CONIKS Proceedings of the 24th USENIX Conference on Security Symposium, (383-398)
  32. ACM
    Gilbert E Open Book Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, (477-486)
  33. ACM
    Roesner F, Molnar D, Moshchuk A, Kohno T and Wang H World-Driven Access Control for Continuous Sensing Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, (1169-1181)
  34. Lécuyer M, Ducoffe G, Lan F, Papancea A, Petsios T, Spahn R, Chaintreau A and Geambasu R XRay Proceedings of the 23rd USENIX conference on Security Symposium, (49-64)
  35. ACM
    Tierney M, Spiro I, Bregler C and Subramanian L Cryptagram Proceedings of the first ACM conference on Online social networks, (75-88)
  36. ACM
    Gilbert S and Zheng C SybilCast Proceedings of the twenty-fifth annual ACM symposium on Parallelism in algorithms and architectures, (130-139)
  37. ACM
    Pranata I, Athauda R and Skinner G (2013). Modeling Decentralized Reputation-Based Trust for Initial Transactions in Digital Environments, ACM Transactions on Internet Technology, 12:3, (1-35), Online publication date: 1-May-2013.
  38. ACM
    Xiao H, Malcolm J, Christianson B and Zhang Y Trustworthiness and authentication in ubiquitous computing Proceedings of the 10th ACM international symposium on Mobility management and wireless access, (135-138)
  39. Glynos D, Argyroudis P and Douligeris C (2012). Collaborative service evaluation with the TwoHop trust framework, Security and Communication Networks, 5:6, (594-613), Online publication date: 1-Jun-2012.
  40. Jia Z, Lin X, Tan S, Li L and Yang Y (2012). Public key distribution scheme for delay tolerant networks based on two-channel cryptography, Journal of Network and Computer Applications, 35:3, (905-913), Online publication date: 1-May-2012.
  41. Omar M, Challal Y and Bouabdallah A (2012). Review, Journal of Network and Computer Applications, 35:1, (268-286), Online publication date: 1-Jan-2012.
  42. ACM
    Hossmann T, Carta P, Schatzmann D, Legendre F, Gunningberg P and Rohner C Twitter in disaster mode Proceedings of the Special Workshop on Internet and Disasters, (1-8)
  43. ACM
    Pranata I, Skinner G and Athauda R A distributed mechanism for secure collaboration in digital ecosystems Proceedings of the International Conference on Management of Emergent Digital EcoSystems, (33-39)
  44. ACM
    Pranata I, Skinner G and Athauda R TIDE Proceedings of the International Conference on Management of Emergent Digital EcoSystems, (9-16)
  45. ACM
    Garcia-Molina H, Koutrika G and Parameswaran A (2011). Information seeking, Communications of the ACM, 54:11, (121-130), Online publication date: 1-Nov-2011.
  46. Mallesh N and Wright M (2011). An analysis of the statistical disclosure attack and receiver-bound cover, Computers and Security, 30:8, (597-612), Online publication date: 1-Nov-2011.
  47. Wojtczak D Trust metrics for the SPKI/SDSI authorisation framework Proceedings of the 9th international conference on Automated technology for verification and analysis, (168-182)
  48. ACM
    Gupta M and Han J (2011). Heterogeneous network-based trust analysis, ACM SIGKDD Explorations Newsletter, 13:1, (54-71), Online publication date: 31-Aug-2011.
  49. Beato F, Kohlweiss M and Wouters K Scramble! your social network data Proceedings of the 11th international conference on Privacy enhancing technologies, (211-225)
  50. Frazier G, Duong Q, Wellman M and Petersen E Incentivizing responsible networking via introduction-based routing Proceedings of the 4th international conference on Trust and trustworthy computing, (277-293)
  51. Almenárez F, Marín A, Díaz D, Cortés A, Campo C and García-Rubio C (2011). Trust management for multimedia P2P applications in autonomic networking, Ad Hoc Networks, 9:4, (687-697), Online publication date: 1-Jun-2011.
  52. Cohen-Almagor R (2011). Internet History, International Journal of Technoethics, 2:2, (45-64), Online publication date: 1-Apr-2011.
  53. Zhang C, Song Y, Fang Y and Zhang Y (2011). On the price of security in large-scale wireless ad hoc networks, IEEE/ACM Transactions on Networking, 19:2, (319-332), Online publication date: 1-Apr-2011.
  54. Post A, Shah V and Mislove A Bazaar Proceedings of the 8th USENIX conference on Networked systems design and implementation, (183-196)
  55. Demertzis F and Xenakis C SOMA Proceedings of the 7th European conference on Public key infrastructures, services and applications, (31-44)
  56. ACM
    Feng X, Qiu Q and Tang Z Copy protection for email Proceedings of the 12th International Conference on Electronic Commerce: Roadmap for the Future of Electronic Business, (163-169)
  57. ACM
    Saadi R, Pierson J and Brunie L T2D Proceedings of the 2010 ACM Symposium on Applied Computing, (1472-1478)
  58. ACM
    Hoffman K, Zage D and Nita-Rotaru C (2009). A survey of attack and defense techniques for reputation systems, ACM Computing Surveys, 42:1, (1-31), Online publication date: 1-Dec-2009.
  59. Seedorf J, D'Heureuse N, Niccolini S and Cornolti M Detecting trustworthy real-time communications using a web-of-trust Proceedings of the 28th IEEE conference on Global telecommunications, (1387-1394)
  60. Alcalde B and Mauw S An algebra for trust dilution and trust fusion Proceedings of the 6th international conference on Formal Aspects in Security and Trust, (4-20)
  61. Herzberg A (2009). DNS-based email sender authentication mechanisms, Computers and Security, 28:8, (731-742), Online publication date: 1-Nov-2009.
  62. Muñoz-Gea J, Malgosa-Sanahuja J, Manzanares-Lopez P, Sanchez-Aarnoutse J and Garcia-Haro J (2009). Proposal, design and evaluation of a mechanism to limit the length of anonymous overlay network paths, Computers and Security, 28:8, (772-784), Online publication date: 1-Nov-2009.
  63. Sirivianos M, Kim K and Yang X FaceTrust Proceedings of the 4th USENIX conference on Hot topics in security, (2-2)
  64. Agudo I, Fernández-Gago C and Lopez J (2009). An Evolutionary Trust and Distrust Model, Electronic Notes in Theoretical Computer Science (ENTCS), 244, (3-12), Online publication date: 1-Aug-2009.
  65. Nogueira M, Pujolle G, Silva E, Santos A and Albini L Survivable keying for wireless ad hoc networks Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management, (606-613)
  66. ACM
    Lambert A, Bezek S and Karahalios K Waterhouse CHI '09 Extended Abstracts on Human Factors in Computing Systems, (4099-4104)
  67. Cao J, Liao L, Wang G, Ma H and Xiao B (2009). A novel dual-key management protocol based on a hierarchical multicast infrastructure in mobile internet, International Journal of Ad Hoc and Ubiquitous Computing, 4:3/4, (183-190), Online publication date: 1-Apr-2009.
  68. Goodrich M, Sirivianos M, Solis J, Soriente C, Tsudik G and Uzun E (2009). Using audio in secure device pairing, International Journal of Security and Networks, 4:1/2, (57-68), Online publication date: 1-Feb-2009.
  69. ACM
    Hernández-Trapote Á, López-Mencía B, Díaz D, Fernández-Pozo R and Caminero J Embodied conversational agents for voice-biometric interfaces Proceedings of the 10th international conference on Multimodal interfaces, (305-312)
  70. ACM
    Herzberg A and Jbara A (2008). Security and identification indicators for browsers against spoofing and phishing attacks, ACM Transactions on Internet Technology, 8:4, (1-36), Online publication date: 1-Sep-2008.
  71. Chen R, Guo W, Tang L, Hu J and Chen Z Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks Proceedings of the 14th international Euro-Par conference on Parallel Processing, (601-610)
  72. ACM
    Guha S, Tang K and Francis P NOYB Proceedings of the first workshop on Online social networks, (49-54)
  73. Mislove A, Post A, Druschel P and Gummadi K Ostra Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, (15-30)
  74. ACM
    Kageyama E, Maziero C and Santin A A pull-based e-mail architecture Proceedings of the 2008 ACM symposium on Applied computing, (468-472)
  75. ACM
    Lenders V, Koukoumidis E, Zhang P and Martonosi M Location-based trust for mobile user-generated content Proceedings of the 9th workshop on Mobile computing systems and applications, (60-64)
  76. ACM
    Awerbuch B, Curtmola R, Holmer D, Nita-Rotaru C and Rubens H (2008). ODSBR, ACM Transactions on Information and System Security, 10:4, (1-35), Online publication date: 1-Jan-2008.
  77. Sen J and Subramanyam H An efficient certificate authority for ad hoc networks Proceedings of the 4th international conference on Distributed computing and internet technology, (97-109)
  78. Spiewak D, Fusenig V and Engel T TrustRings in mobile wireless network settings Proceedings of the 6th WSEAS international conference on Information security and privacy, (63-68)
  79. Saadi R, Pierson J and Brunie L Context adapted certificate using morph template signature for pervasive environments Proceedings of the 4th international conference on Ubiquitous computing systems, (17-32)
  80. Saadi R, Pierson J and Brunie L Context Adapted Certificate Using Morph Template Signature for Pervasive Environments Ubiquitous Computing Systems, (17-32)
  81. ACM
    Appelt W, Pajo S and Prinz W Supporting trust building in distributed groups by appropriate security technology Proceedings of the 2007 ACM International Conference on Supporting Group Work, (391-398)
  82. Singaraju G and Kang B RepuScore Proceedings of the 21st conference on Large Installation System Administration Conference, (1-9)
  83. Arenas A, Wilson M and Matthews B On trust management in grids Proceedings of the 1st international conference on Autonomic computing and communication systems, (1-7)
  84. ACM
    Guha S and Francis P (2007). An end-middle-end approach to connection establishment, ACM SIGCOMM Computer Communication Review, 37:4, (193-204), Online publication date: 1-Oct-2007.
  85. Lui R, Hui L and Yiu S (2007). Delegation with supervision, Information Sciences: an International Journal, 177:19, (4014-4030), Online publication date: 1-Oct-2007.
  86. Mallesh N and Wright M Countering statistical disclosure with receiver-bound cover traffic Proceedings of the 12th European conference on Research in Computer Security, (547-562)
  87. Saadi R, Pierson J and Brunie L X316 security toolbox for new generation of certificate Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business, (248-258)
  88. ACM
    Guha S and Francis P An end-middle-end approach to connection establishment Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, (193-204)
  89. Chakrabarti S, Chandrasekhar S, Singhal M and Calvert K Authenticating DSR using a novel multisignature scheme based on cubic LFSR sequences Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks, (156-171)
  90. ACM
    Oorschot P, Wan T and Kranakis E (2007). On interdomain routing security and pretty secure BGP (psBGP), ACM Transactions on Information and System Security, 10:3, (11-es), Online publication date: 1-Jul-2007.
  91. Boldyreva A, Fischlin M, Palacio A and Warinschi B A closer look at PKI Proceedings of the 10th international conference on Practice and theory in public-key cryptography, (458-475)
  92. ACM
    Merwe J, Dawoud D and McDonald S (2007). A survey on peer-to-peer key management for mobile ad hoc networks, ACM Computing Surveys, 39:1, (1-es), Online publication date: 12-Apr-2007.
  93. ACM
    Kolan P and Dantu R (2007). Socio-technical defense against voice spamming, ACM Transactions on Autonomous and Adaptive Systems, 2:1, (2-es), Online publication date: 1-Mar-2007.
  94. Jøsang A, Ismail R and Boyd C (2007). A survey of trust and reputation systems for online service provision, Decision Support Systems, 43:2, (618-644), Online publication date: 1-Mar-2007.
  95. Tseng Y (2007). A heterogeneous-network aided public-key management scheme for mobile ad hoc networks, International Journal of Network Management, 17:1, (3-15), Online publication date: 1-Jan-2007.
  96. Butler K, Enck W, Plasterr J, Traynor P and McDaniel P Privacy preserving web-based email Proceedings of the Second international conference on Information Systems Security, (116-131)
  97. ACM
    Wu Z and Weaver A Using web service enhancements to bridge business trust relationships Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, (1-8)
  98. ACM
    Kohlas R, Jonczy J and Haenni R Towards a precise semantics for authenticity and trust Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, (1-9)
  99. ACM
    Boyen X, Shacham H, Shen E and Waters B Forward-secure signatures with untrusted update Proceedings of the 13th ACM conference on Computer and communications security, (191-200)
  100. Byun J, Rhee H, Park H and Lee D Off-line keyword guessing attacks on recent keyword search schemes over encrypted data Proceedings of the Third VLDB international conference on Secure Data Management, (75-83)
  101. Toledano D, Fernández Pozo R, Hernández Trapote Á and Hernández Gómez L (2006). Usability evaluation of multi-modal biometric verification systems, Interacting with Computers, 18:5, (1101-1122), Online publication date: 1-Sep-2006.
  102. ACM
    Kim E, Gupta A, Tsendjav B and Massey D Resolving islands of security problem for DNSSEC Proceedings of the 2006 international conference on Wireless communications and mobile computing, (1271-1276)
  103. Quinn K, Sullivan D, Lewis D and Wade V The design, generation, and utilisation of a semantically rich personalised model of trust Proceedings of the 4th international conference on Trust Management, (324-338)
  104. ACM
    Huynh T, Jennings N and Shadbolt N Certified reputation Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, (1217-1224)
  105. Sánchez D, Lopez A and Mendoza F A smart card solution for access control and trust management for nomadic users Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications, (62-77)
  106. Pathak V and Iftode L (2006). Byzantine fault tolerant public key authentication in peer-to-peer systems, Computer Networks: The International Journal of Computer and Telecommunications Networking, 50:4, (579-596), Online publication date: 15-Mar-2006.
  107. Wang Z, Zhang Z and Zhang Y Towards enhancing trust on chinese e-commerce Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development, (331-342)
  108. Wang P, Ning P and Reeves D Network Access Control for Mobile Ad-Hoc Networks Information and Communications Security, (350-362)
  109. Park S and Lee S ID-Based access control and authority delegations Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing, (884-893)
  110. ACM
    Di Raimondo M, Gennaro R and Krawczyk H Secure off-the-record messaging Proceedings of the 2005 ACM workshop on Privacy in the electronic society, (81-89)
  111. Gouda M and Jung E Stabilizing certificate dispersal Proceedings of the 7th international conference on Self-Stabilizing Systems, (140-152)
  112. Luo J, Hubaux J and Eugster P (2005). DICTATE, IEEE Transactions on Dependable and Secure Computing, 2:4, (311-323), Online publication date: 1-Oct-2005.
  113. ACM
    Al-Hamdani W and Griskell I A proposed curriculum of cryptography courses Proceedings of the 2nd annual conference on Information security curriculum development, (4-11)
  114. ACM
    van der Merwe J, Dawoud D and McDonald S Fully self-organized peer-to-peer key management for mobile ad hoc networks Proceedings of the 4th ACM workshop on Wireless security, (21-30)
  115. Amir Y, Nita-Rotaru C, Stanton J and Tsudik G (2005). Secure Spread, IEEE Transactions on Dependable and Secure Computing, 2:3, (248-261), Online publication date: 1-Jul-2005.
  116. ACM
    Saadi R, Pierson J and Brunie L Authentification par la méfiance dans les systèmes pervasifs Proceedings of the 2nd French-speaking conference on Mobility and ubiquity computing, (93-96)
  117. Jøsang A, Keser C and Dimitrakos T Can we manage trust? Proceedings of the Third international conference on Trust Management, (93-107)
  118. Phan R and Siddiqi M Related-mode attacks on block cipher modes of operation Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III, (661-671)
  119. Drugan O, Dionysiou I, Bakken D, Plagemann T, Hauser C and Frincke D On the importance of composability of ad hoc mobile middleware and trust management Proceedings of the Second international conference on Service Availability, (149-163)
  120. Burmester M, de Medeiros B and Yasinsac A Community-centric vanilla-rollback access, or Proceedings of the 13th international conference on Security protocols, (228-237)
  121. Almenárez F, Marín A, Campo C and García R. C TrustAC Proceedings of the Second international conference on Security in Pervasive Computing, (225-238)
  122. ACM
    Go H, Chan P, Dong Y, Sui A, Yiu S, Hui L and Li V Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs) Proceedings of the 43rd annual Southeast regional conference - Volume 2, (75-80)
  123. ACM
    Khurana H, Slagell A and Bonilla R SELS Proceedings of the 2005 ACM symposium on Applied computing, (306-313)
  124. Garfinkel S, Schiller J, Nordlander E, Margrave D and Miller R Views, reactions and impact of digitally-signed mail in e-commerce Proceedings of the 9th international conference on Financial Cryptography and Data Security, (188-202)
  125. Jøsang A and Pope S Semantic constraints for trust transitivity Proceedings of the 2nd Asia-Pacific conference on Conceptual modelling - Volume 43, (59-68)
  126. Luo H, Kong J, Zerfos P, Lu S and Zhang L (2004). URSA, IEEE/ACM Transactions on Networking, 12:6, (1049-1063), Online publication date: 1-Dec-2004.
  127. ACM
    Quillinan T and Foley S Security in WebCom Proceedings of the 2004 workshop on Secure web service, (97-105)
  128. ACM
    Borisov N, Goldberg I and Brewer E Off-the-record communication, or, why not to use PGP Proceedings of the 2004 ACM workshop on Privacy in the electronic society, (77-84)
  129. Sproull T and Lockwood J Distributed instrusion prevention in active and extensible networks Proceedings of the 6th IFIP TC6 international working conference on Active networks, (54-65)
  130. ACM
    Theodorakopoulos G and Baras J Trust evaluation in ad-hoc networks Proceedings of the 3rd ACM workshop on Wireless security, (1-10)
  131. Nyberg K IKE in ad-hoc IP networking Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks, (139-151)
  132. Ungureanu V (2004). Formal support for certificate management policies, Computers and Security, 23:4, (300-311), Online publication date: 1-Jun-2004.
  133. ACM
    Wiechers W, Daskapan S and Vree W Simulating the establishment of trust infrastructures in multi-agent systems Proceedings of the 6th international conference on Electronic commerce, (255-264)
  134. Ngai E and Lyu M Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7, (582-587)
  135. ACM
    Seigneur J and Jensen C Trust enhanced ubiquitous payment without too much privacy loss Proceedings of the 2004 ACM symposium on Applied computing, (1593-1599)
  136. Rennhard M, Rafaeli S, Mathy L, Plattner B and Hutchison D (2004). Towards Pseudonymous e-Commerce, Electronic Commerce Research, 4:1-2, (83-111), Online publication date: 1-Jan-2004.
  137. Herzberg A and Mass Y (2004). Relying Party Credentials Framework, Electronic Commerce Research, 4:1-2, (23-39), Online publication date: 1-Jan-2004.
  138. Patton M and Jøsang A (2004). Technologies for Trust in Electronic Commerce, Electronic Commerce Research, 4:1-2, (9-21), Online publication date: 1-Jan-2004.
  139. Key Management for Encrypted Data Storage in Distributed Systems Proceedings of the Second IEEE International Security in Storage Workshop
  140. ACM
    Crépeau C and Davis C A certificate revocation scheme for wireless ad hoc networks Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, (54-61)
  141. ACM
    Bohge M and Trappe W An authentication framework for hierarchical ad hoc sensor networks Proceedings of the 2nd ACM workshop on Wireless security, (79-87)
  142. ACM
    Kong J, Das S, Tsai E and Gerla M ESCORT Proceedings of the 2nd ACM workshop on Wireless security, (51-60)
  143. Bidder A and Weiler N Key Exchange (KX) - A Next Generation Protocol to Synchronise PGP Keyservers Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
  144. ACM
    Čapkun S, Hubaux J and Buttyán L Mobility helps security in ad hoc networks Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing, (46-56)
  145. Undercoffer J, Perich F, Cedilnik A, Kagal L and Joshi A (2003). A secure infrastructure for service discovery and access in pervasive computing, Mobile Networks and Applications, 8:2, (113-125), Online publication date: 1-Apr-2003.
  146. Garfinkel S Pretty good privacy (PGP) Encyclopedia of Computer Science, (1421-1422)
  147. ACM
    Padmanabhan V and Simon D (2003). Secure traceroute to detect faulty or malicious routing, ACM SIGCOMM Computer Communication Review, 33:1, (77-82), Online publication date: 1-Jan-2003.
  148. Čapkun S, Buttyán L and Hubaux J (2003). Self-Organized Public-Key Management for Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, 2:1, (52-64), Online publication date: 1-Jan-2003.
  149. ACM
    Keoh S and Lupu E Towards flexible credential verification in mobile ad-hoc networks Proceedings of the second ACM international workshop on Principles of mobile computing, (58-65)
  150. ACM
    Awerbuch B, Holmer D, Nita-Rotaru C and Rubens H An on-demand secure routing protocol resilient to byzantine failures Proceedings of the 1st ACM workshop on Wireless security, (21-30)
  151. ACM
    Yang H, Meng X and Lu S Self-organized network-layer security in mobile ad hoc networks Proceedings of the 1st ACM workshop on Wireless security, (11-20)
  152. ACM
    Čapkun S, Buttyán L and Hubaux J Small worlds in security systems Proceedings of the 2002 workshop on New security paradigms, (28-35)
  153. Lotspiech J, Nusser S and Pestoni F (2002). Broadcast Encryption's Bright Future, Computer, 35:8, (57-63), Online publication date: 1-Aug-2002.
  154. Mui L, Halberstadt A and Mohtashemi M Evaluating reputation in multi-agents systems Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice, (123-137)
  155. ACM
    Mui L, Mohtashemi M and Halberstadt A Notions of reputation in multi-agents systems Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1, (280-287)
  156. ACM
    Hubaux J, Buttyán L and Capkun S The quest for security in mobile ad hoc networks Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, (146-155)
  157. Song D, Wagner D and Tian X Timing analysis of keystrokes and timing attacks on SSH Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
  158. Aura T Distributed access-rights management with delegation certificates Secure Internet programming, (211-235)
  159. ACM
    Steiner M, Buhler P, Eirich T and Waidner M (2001). Secure password-based cipher suite for TLS, ACM Transactions on Information and System Security, 4:2, (134-157), Online publication date: 1-May-2001.
  160. ACM
    Park J, Sandhu R and Ahn G (2001). Role-based access control on the web, ACM Transactions on Information and System Security, 4:1, (37-71), Online publication date: 1-Feb-2001.
  161. Au R, Looi M and Ashley P Automated cross-organisational trust establishment on extranets Proceedings of the workshop on Information technology for virtual enterprises, (3-11)
  162. Au R, Looi M and Ashley P (2001). Automated cross-organisational trust establishment on extranets, Australian Computer Science Communications, 23:6, (3-11), Online publication date: 1-Jan-2001.
  163. Hemmerich C Automating Request-based Software Distribution Proceedings of the 14th USENIX conference on System administration, (197-206)
  164. ACM
    Adams C, Burmester M, Desmedt Y, Reiter M and Zimmermann P Which PKI (public key infrastructure) is the right one? (panel session) Proceedings of the 7th ACM conference on Computer and Communications Security, (98-101)
  165. ACM
    Wright R, Lincoln P and Millen J Efficient fault-tolerant certificate revocation Proceedings of the 7th ACM conference on Computer and Communications Security, (19-24)
  166. Brown M, Cheung D, Hankerson D, Hernandez J, Kirkup M and Menezes A PGP in constrained wireless devices Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, (19-19)
  167. Katz J and Schneier B A chosen ciphertext attack against several e-mail encryption protocols Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, (18-18)
  168. Park J and Sandhu R (2000). Secure Cookies on the Web, IEEE Internet Computing, 4:4, (36-44), Online publication date: 1-Jul-2000.
  169. ACM
    Wright R Obstacles to freedom and privacy by design Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions, (97-100)
  170. ACM
    Cranor L and Wright R Influencing software usage Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions, (45-55)
  171. Bentley D, Rose G and Whalen T ssmail: Opportunistic Encryption in sendmail Proceedings of the 13th USENIX conference on System administration, (1-8)
  172. Fujimura K, Kuno H, Terada M, Matsuyama K, Mizuno Y and Sekine J Digital-ticket-controlled digital ticket circulation Proceedings of the 8th conference on USENIX Security Symposium - Volume 8, (18-18)
  173. Li N, Feigenbaum J and Grosof B A Logic-based Knowledge Representation for Authorization with Delegation Proceedings of the 12th IEEE workshop on Computer Security Foundations
  174. ACM
    Zadeh J Cryptography on the Internet Proceedings of the 37th annual Southeast regional conference (CD-ROM), (45-es)
  175. Reiter M and Stubblebine S (1998). Resilient Authentication Using Path Independence, IEEE Transactions on Computers, 47:12, (1351-1362), Online publication date: 1-Dec-1998.
  176. ACM
    He Q, Sycara K and Finin T Personal security agent Proceedings of the second international conference on Autonomous agents, (377-384)
  177. ACM
    Matocha J, Camp T and Hooper R (1998). Extended analogy, ACM SIGCSE Bulletin, 30:1, (262-266), Online publication date: 1-Mar-1998.
  178. ACM
    Matocha J, Camp T and Hooper R Extended analogy Proceedings of the twenty-ninth SIGCSE technical symposium on Computer science education, (262-266)
  179. Levien R and Aiken A Attack-resistant trust metrics for public key certification Proceedings of the 7th conference on USENIX Security Symposium - Volume 7, (18-18)
  180. ACM
    Pfitzmann B and Waidner M (1998). How to break fraud-detectable key recovery, ACM SIGOPS Operating Systems Review, 32:1, (23-28), Online publication date: 1-Jan-1998.
  181. ACM
    Reiter M and Stubblebine S Path independence for authentication in large-scale systems Proceedings of the 4th ACM conference on Computer and communications security, (57-66)
  182. ACM
    Monrose F and Rubin A Authentication via keystroke dynamics Proceedings of the 4th ACM conference on Computer and communications security, (48-56)
  183. ACM
    Chuang S and Wernick P A credibility-based model of computer system security Proceedings of the 1996 workshop on New security paradigms, (53-58)
  184. ACM
    Black A and Inouye J System support for mobility Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems support for worldwide applications, (129-132)
  185. Davis D Compliance defects in public-key cryptography Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6, (17-17)
  186. Caronni G, Lubich H, Aziz A, Markson T and Skrenta R SKIP-securing the Internet Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
  187. Oppliger R and Albanese A Distance education and on-line universities Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
  188. ACM
    Bhimani A (1996). Securing the commercial Internet, Communications of the ACM, 39:6, (29-35), Online publication date: 1-Jun-1996.
  189. ACM
    Weeks J, Cain A and Sanderson B CCI-Based Web Security: A Design Using PGP Proceedings of the Fourth International Conference on World Wide Web, (381-395)
  190. Huang J, Seck M and Gheorghe A Towards trustworthy smart cyber-physical-social systems in the era of Internet of Things 2016 11th System of Systems Engineering Conference (SoSE), (1-6)
Contributors
  • Swiss Federal Institute of Technology, Zurich

Recommendations

Jonathan K. Millen

This volume is a political treatise, a cry for help, a short course in computer and network security, and a manual for a software package that is available for free on the Internet. PGP stands for “Pretty Good Privacy,” and it provides privacy and authentication for files and electronic mail. The author has been in trouble both with the US Government for making good cryptographic software easily available on the Internet, and with Public Key Partners, the holders of the RSA patent, because the first version of PGP included Zimmermann's independently coded implementation of the RSA public-key system. The federal case has recently been dropped, and the latter problem was resolved by employing the properly licensed RSAREF implementation in newer versions of PGP. Within the US, copies of the program for private noncommercial use can be ftp'd from net-dist.mit.edu, and a commercial version can be bought from ViaCrypt. The text of this user's guide is also downloadable. The tone of the book is set by John Barlow's foreword. With revolutionary fervor, the significance and potential worldwide impact of electronic privacy are made clear, for better or for worse, but with an evident conviction that it is for the better. Chapter 1 brings up the Clipper debate and the FBI Digital Telephony Wiretap bill. Chapter 12 covers the legal issues, including licensing restrictions and export controls. The presentation there is the ambivalent result of a tug of war between the need to present the letter of the law and the fact of unrestricted foreign availability of PGP from several sources. As a manual, the book is reasonably well organized. It begins with an introduction to public-key principles and quickly presents the command-line interface for basic functions, as used in MS-DOS and UNIX versions. The Macintosh version, mentioned briefly but not described, has menu choices that correspond in a self-evident way to command lines. No Windows version is mentioned. A legion of options and auxiliary files are catalogued in later sections. Zimmermann emphasizes the assurance aspects of privacy—why should a user trust the algorithms, the program code, the computer on which it runs, and the authenticity of other users' public keys__?__ There is a chapter on potential vulnerabilities. The key management chapter discusses the program's heuristics relating to propagation of trust in key signatures, the principle behind what has come to be known as the “web of trust.” Copies of the program are digitally signed with the author's key, and the “fingerprint” (hashed digest) of his public key is printed in the book. The essential information about the workings of the program is covered at a narrative level, enough to encourage confidence in it, but with only a user's guide level of detail. The algorithms used are named, and their pedigrees given: RSA for signatures and key management, MD5 for forming digests, and IDEA for conventional encryption and random number generation. The program was intended for use on a single-user machine, but there are some protections that seem to be addressed to serial multiuser environments, such as pass phrases to protect secret keys. It is<__?__Pub Caret> not stated whether users' pass phrases, or the secret keys themselves, are encrypted for storage by the program. The book is educational and eye-opening. If one skips over the command-line reference material, it furnishes a quick, sophisticated introduction to the thorny issues of public communication security.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.