2001 | ||
---|---|---|
3 | EE | James M. Hayes: Restricting Access with Certificate Attributes in Multiple Root Environments-A Recipe for Certificate Masquerading. ACSAC 2001: 386-390 |
1999 | ||
2 | EE | James M. Hayes: Secure In-Band Update of Trusted Certificates. WETICE 1999: 168-173 |
1998 | ||
1 | EE | James M. Hayes: The Problem with Multiple Roots in Web Browsers - Certificate Masquerading. WETICE 1998: 306-313 |