2006 | ||
---|---|---|
8 | EE | Peter Gutmann: PKI design for the real world. NSPW 2006: 109-116 |
2005 | ||
7 | EE | Peter Gutmann, David Naccache, Charles C. Palmer: When Hashes Collide. IEEE Security & Privacy 3(3): 68-71 (2005) |
6 | EE | Peter Gutmann, Ian Grigg: Security Usability. IEEE Security & Privacy 3(4): 56-58 (2005) |
2004 | ||
5 | EE | Peter Gutmann: Simplifying Public Key Management. IEEE Computer 37(2): 101-103 (2004) |
2002 | ||
4 | EE | Peter Gutmann: Lessons Learned in Implementing and Deploying Crypto Software. USENIX Security Symposium 2002: 315-325 |
3 | EE | Peter Gutmann: PKI: It's Not Dead, Just Resting. IEEE Computer 35(8): 41-49 (2002) |
2000 | ||
2 | EE | Peter Gutmann: A Reliable, Scalable General-Purpose Certificate Store. ACSAC 2000: 278-287 |
1996 | ||
1 | Jenny Shearer, Peter Gutmann: Government, Cryptography, and the Right to Privacy. J. UCS 2(3): 113-146 (1996) |
1 | Ian Grigg | [6] |
2 | David Naccache | [7] |
3 | Charles C. Palmer | [7] |
4 | Jenny Shearer | [1] |