![]() |
| 2006 | ||
|---|---|---|
| 8 | EE | Peter Gutmann: PKI design for the real world. NSPW 2006: 109-116 |
| 2005 | ||
| 7 | EE | Peter Gutmann, David Naccache, Charles C. Palmer: When Hashes Collide. IEEE Security & Privacy 3(3): 68-71 (2005) |
| 6 | EE | Peter Gutmann, Ian Grigg: Security Usability. IEEE Security & Privacy 3(4): 56-58 (2005) |
| 2004 | ||
| 5 | EE | Peter Gutmann: Simplifying Public Key Management. IEEE Computer 37(2): 101-103 (2004) |
| 2002 | ||
| 4 | EE | Peter Gutmann: Lessons Learned in Implementing and Deploying Crypto Software. USENIX Security Symposium 2002: 315-325 |
| 3 | EE | Peter Gutmann: PKI: It's Not Dead, Just Resting. IEEE Computer 35(8): 41-49 (2002) |
| 2000 | ||
| 2 | EE | Peter Gutmann: A Reliable, Scalable General-Purpose Certificate Store. ACSAC 2000: 278-287 |
| 1996 | ||
| 1 | Jenny Shearer, Peter Gutmann: Government, Cryptography, and the Right to Privacy. J. UCS 2(3): 113-146 (1996) | |
| 1 | Ian Grigg | [6] |
| 2 | David Naccache | [7] |
| 3 | Charles C. Palmer | [7] |
| 4 | Jenny Shearer | [1] |