ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
5
views
0
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,156
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
Authorization Models — PKI Versus the Real World
Author(s):
Steve Matthews
Publication date
Created:
December 2000
Publication date
(Print):
December 2000
Journal:
Information Security Technical Report
Publisher:
Elsevier BV
Read this article at
ScienceOpen
Publisher
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Exponential Random Graph Models
Author and article information
Journal
Title:
Information Security Technical Report
Abbreviated Title:
Information Security Technical Report
Publisher:
Elsevier BV
ISSN (Print):
13634127
Publication date Created:
December 2000
Publication date (Print):
December 2000
Volume
: 5
Issue
: 4
Pages
: 66-71
Article
DOI:
10.1016/S1363-4127(00)04007-3
SO-VID:
79f088a8-a04c-4896-b900-1ca02df0640f
Copyright ©
© 2000
License:
https://www.elsevier.com/tdm/userlicense/1.0/
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
3,156
Securing mobile ad hoc networks using distributed firewall with PKI
Authors:
PKI Key Generation Based on Iris Features
Authors:
Yazhuo Gong
,
Kaifa Deng
,
Pengfei Shi
A PKI-free key agreement protocol for P2P VoIP applications
Authors:
Riccardo Pecori
,
R. Pecori
See all similar