Show simple item record

dc.contributor.authorLow, M.R.
dc.contributor.authorChristianson, B.
dc.date.accessioned2010-11-15T14:35:13Z
dc.date.available2010-11-15T14:35:13Z
dc.date.issued1995
dc.identifier.citationLow , M R & Christianson , B 1995 , Nested signature blocks . UH Computer Science Technical Report , vol. 223 , University of Hertfordshire .
dc.identifier.otherdspace: 2299/4989
dc.identifier.urihttp://hdl.handle.net/2299/4989
dc.description.abstractFor any signature block and any other data, there exists a key which produces the same signature block. In this report we identify the threat that this poses for the SAProxy scheme which uses nested signature blocks as pointers to other tokens. A modification to public key certificates is then proposed to eliminate this threat.en
dc.format.extent932131
dc.language.isoeng
dc.publisherUniversity of Hertfordshire
dc.relation.ispartofseriesUH Computer Science Technical Report
dc.titleNested signature blocksen
dc.contributor.institutionSchool of Computer Science
dc.contributor.institutionCentre for Computer Science and Informatics Research
rioxxterms.typeOther
herts.preservation.rarelyaccessedtrue


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record