J. Dankers, T. Garefalakis, R. Schaffelhofer, T. Wright
{"title":"移动系统中的公钥基础设施","authors":"J. Dankers, T. Garefalakis, R. Schaffelhofer, T. Wright","doi":"10.1049/ECEJ:20020501","DOIUrl":null,"url":null,"abstract":"In current mobile systems, some applications to some extent already use public key techniques and an underlying public key infrastructure (PKI) to provide end-to-end security, and such use is widely expected to grow. This paper provides an overview of the basic techniques and the entities that are involved in a PKI and describes how they are used in current mobile systems. The paper also highlights the envisaged use of PKI in future mobile systems and the challenges that brings, drawing on results of the European Union's SHAMAN project.","PeriodicalId":127784,"journal":{"name":"Electronics & Communication Engineering Journal","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2002-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"50","resultStr":"{\"title\":\"Public key infrastructure in mobile systems\",\"authors\":\"J. Dankers, T. Garefalakis, R. Schaffelhofer, T. Wright\",\"doi\":\"10.1049/ECEJ:20020501\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In current mobile systems, some applications to some extent already use public key techniques and an underlying public key infrastructure (PKI) to provide end-to-end security, and such use is widely expected to grow. This paper provides an overview of the basic techniques and the entities that are involved in a PKI and describes how they are used in current mobile systems. The paper also highlights the envisaged use of PKI in future mobile systems and the challenges that brings, drawing on results of the European Union's SHAMAN project.\",\"PeriodicalId\":127784,\"journal\":{\"name\":\"Electronics & Communication Engineering Journal\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2002-12-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"50\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Electronics & Communication Engineering Journal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1049/ECEJ:20020501\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Electronics & Communication Engineering Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/ECEJ:20020501","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In current mobile systems, some applications to some extent already use public key techniques and an underlying public key infrastructure (PKI) to provide end-to-end security, and such use is widely expected to grow. This paper provides an overview of the basic techniques and the entities that are involved in a PKI and describes how they are used in current mobile systems. The paper also highlights the envisaged use of PKI in future mobile systems and the challenges that brings, drawing on results of the European Union's SHAMAN project.