![]() |
| 2001 | ||
|---|---|---|
| 3 | EE | James M. Hayes: Restricting Access with Certificate Attributes in Multiple Root Environments-A Recipe for Certificate Masquerading. ACSAC 2001: 386-390 |
| 1999 | ||
| 2 | EE | James M. Hayes: Secure In-Band Update of Trusted Certificates. WETICE 1999: 168-173 |
| 1998 | ||
| 1 | EE | James M. Hayes: The Problem with Multiple Roots in Web Browsers - Certificate Masquerading. WETICE 1998: 306-313 |