Show simple item record

dc.contributor.authorLow, M.R.
dc.contributor.authorChristianson, B.
dc.date.accessioned2010-11-15T14:35:13Z
dc.date.available2010-11-15T14:35:13Z
dc.date.issued1995
dc.identifier.citationLow , M R & Christianson , B 1995 , Nested signature blocks . UH Computer Science Technical Report , vol. 223 , University of Hertfordshire .
dc.identifier.otherPURE: 99733
dc.identifier.otherPURE UUID: 2b27b4b5-b911-45b0-9302-14c0e106175d
dc.identifier.otherdspace: 2299/4989
dc.identifier.otherScopus: 0029323414
dc.identifier.urihttp://hdl.handle.net/2299/4989
dc.description.abstractFor any signature block and any other data, there exists a key which produces the same signature block. In this report we identify the threat that this poses for the SAProxy scheme which uses nested signature blocks as pointers to other tokens. A modification to public key certificates is then proposed to eliminate this threat.en
dc.language.isoeng
dc.publisherUniversity of Hertfordshire
dc.relation.ispartofseriesUH Computer Science Technical Report
dc.rightsOpen
dc.titleNested signature blocksen
dc.contributor.institutionSchool of Computer Science
dc.relation.schoolSchool of Computer Science
dcterms.dateAccepted1995
rioxxterms.typeOther
herts.preservation.rarelyaccessedtrue
herts.rights.accesstypeOpen


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record