Certificateless Public Key Encryption Without Pairing, Information Security, 8th International Conference Proceedings, pp.134-148, 2005. ,
DOI : 10.1007/11556992_10
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.3092
ARPKI, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.382-393, 2014. ,
DOI : 10.1145/2382196.2382204
A security evaluation of DNSSEC with NSEC3, Proceedings of the Network and Distributed System Security Symposium, NDSS 2010, 2010. ,
A user-centric PKI based-protocol to manage FC2 digital identities, IJCSI International Journal of Computer Science Issues, vol.8, issue.1, pp.74-80, 2011. ,
Security properties: two agents are sufficient, Science of Computer Programming, vol.50, issue.1-3, pp.51-71, 2004. ,
DOI : 10.1016/j.scico.2003.12.002
URL : https://hal.archives-ouvertes.fr/inria-00099981
Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, RFC, vol.5280, 2008. ,
DOI : 10.17487/rfc5280
On the security of public key protocols, Proceedings of the 22Nd Annual Symposium on Foundations of Computer Science, SFCS '81, pp.350-357, 1981. ,
Private multiparty matrix multiplication and trust computations, Proceedings of the 13th International Joint Conference on e-Business and Telecommunications, pp.61-72, 2016. ,
DOI : 10.5220/0005957200610072
URL : https://hal.archives-ouvertes.fr/hal-01344750
Certificate-Based Encryption and the Certificate Revocation Problem, Proceedings of the 22Nd International Conference on Theory and Applications of Cryptographic Techniques, EURO- CRYPT'03, pp.272-293, 2003. ,
DOI : 10.1007/3-540-39200-9_17
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.2805
Accountable key infrastructure (AKI), Proceedings of the 22nd international conference on World Wide Web, WWW '13, pp.679-690, 2013. ,
DOI : 10.1109/SP.2011.45
Certificate authority transparency and auditability. white paper, 2011. ,
DOI : 10.1145/2668152.2668154
The TAMARIN Prover for the Symbolic Analysis of Security Protocols, Computer Aided Verification -25th International Conference, CAV 2013, pp.696-701, 2013. ,
DOI : 10.1007/978-3-642-39799-8_48
???-OCSP: A protocol to reduce the processing burden in online certificate status validation, Electronic Commerce Research, vol.29, issue.3, p.255, 2008. ,
DOI : 10.1007/978-3-540-25980-0_7
Internet X.509 Public Key Infrastructure ? HTTP Transfer for the Certificate Management Protocol (CMP), RFC, vol.6712, 2012. ,
Trust anchor management requirements, RFC, vol.6024, 2010. ,
DOI : 10.17487/rfc6024
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.185.2472
Enhanced certificate transparency and end-to-end encrypted mail, 21st Annual Network and Distributed System Security Symposium, NDSS 2014, 2014. ,
Automated analysis of diffiehellman protocols and advanced security properties, 25th IEEE Computer Security Foundations Symposium, CSF 2012, pp.78-94, 2012. ,
DOI : 10.1109/csf.2012.25
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.377.8368
NSEC5, DNSSEC Authenticated Denial of Existence. Internet-Draft draft-vcelak-nsec5-03, Progress, 2016. ,
DTKI: A New Formalized PKI with Verifiable Trusted Parties, The Computer Journal, vol.59, issue.11, pp.1695-1713, 2016. ,
DOI : 10.1093/comjnl/bxw039
URL : https://hal.archives-ouvertes.fr/hal-01403899
The Official PGP User's Guide, 1995. ,