Abstract | ||
---|---|---|
This paper describes a software authentication technique based on the public key cryptography for information integrity. The software provider can use a secret key to sign any released program and the user can verify the integrity of programs obtained from vendors or a “trusted information database”. The software provider needs to go through a registration process to become “licensed” and obtains certificates from multiple certificate centers before being able to sign any released program. Users need only one public key to verify the integrity of the programs. |
Year | DOI | Venue |
---|---|---|
1992 | 10.1016/0167-4048(92)90130-J | Computers & Security |
Keywords | Field | DocType |
integrity,information integrity,authenticaion,information protection,software authentication system,cryptography,rsa digital signature,authentication,information integration | World Wide Web,Internet privacy,Authentication,Computer security,Cryptography,Computer science,Information protection policy,Information integrity,Digital signature,Software,Public-key cryptography,Certificate | Journal |
Volume | Issue | ISSN |
11 | 9 | Computers & Security |
Citations | PageRank | References |
1 | 0.35 | 7 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Lein Harn | 1 | 689 | 222.27 |
Hung-Yu Lin | 2 | 82 | 12.59 |
Shoubao Yang | 3 | 172 | 25.43 |