Computer Science ›› 2007, Vol. 34 ›› Issue (1): 128-129.

Previous Articles     Next Articles

LI Yin-Dong GUO Yi-Wei MA Hong (NDSC, Information Engineering University, Zhengzhou 450002)   

  • Online:2018-11-16 Published:2018-11-16

Abstract: XKMS will be the next generation scheme on PKI deployment, but it is not developed enough. When an interaction occurred with lying PKI, it may be a more compact and future-oriented scheme to predigest certificate validation in XKMS, which bring feature of

Key words: DSML, XKMS, LDAP

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!