{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:08:10Z","timestamp":1730290090568,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T00:00:00Z","timestamp":1509494400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T00:00:00Z","timestamp":1509494400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/pkia.2017.8278951","type":"proceedings-article","created":{"date-parts":[[2018,2,5]],"date-time":"2018-02-05T22:31:59Z","timestamp":1517869919000},"page":"9-10","source":"Crossref","is-referenced-by-count":10,"title":["Evolution of PKI ecosystem"],"prefix":"10.1109","author":[{"given":"Balaji","family":"Rajendran","sequence":"first","affiliation":[{"name":"Centre for Development of Advanced Computing (C-DAC), Bangalore, India"}]}],"member":"263","reference":[{"key":"ref10","first-page":"23","article-title":"A New Modified Bridge Certification Authority PKI Trust Model","author":"li","year":"2007","journal-title":"Pervasive Computing and Applications 1st International Symposium IEEE"},{"journal-title":"Electronic signature towards a seamless integration of legislation and technology","year":"2014","author":"chan","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/.2006.1629442"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24852-1_20"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ADCONS.2013.52"},{"journal-title":"Usability Challenges of PKI","year":"2006","author":"straub","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2011.6102327"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-010-9573-1"},{"journal-title":"2017 Public Key Infrastructure (PKI) and Internet of Things (IoT) Security Predictions","year":"0","key":"ref18"},{"journal-title":"2017 PKI Global Trends Study","year":"2017","key":"ref19"},{"journal-title":"PKI Ten Years Later PKI R&D Workshop","year":"2004","author":"adams","key":"ref4"},{"key":"ref3","article-title":"Trust Models and Management in PublicKey Infrastructures","author":"linn","year":"2000","journal-title":"RSA Laboratories"},{"key":"ref6","article-title":"Ten risks of PKI: What you're not being told about public key infrastructure","volume":"16","author":"ellison","year":"2000","journal-title":"Computers and Security Journal"},{"journal-title":"20 Years of PKI and Secure Transactions | Entrust Datacard","year":"2017","key":"ref5"},{"key":"ref8","first-page":"1","article-title":"Cross-certification and PKI policy networking","author":"turnbull","year":"2000","journal-title":"Entrust"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1023787"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1108\/09685229810227667"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/65.806987"},{"journal-title":"Understanding PKI","year":"2002","author":"adams","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27576-0_20"},{"key":"ref22","article-title":"DigiNotar Certificate Authority Breach, &#x201C;Operation Black Tulip","author":"prins","year":"2011","journal-title":"Interim Report Fox-IT"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_22"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.57"},{"journal-title":"Blockchain Blueprint for a New Economy","year":"2015","author":"swan","key":"ref23"},{"journal-title":"FIDO Alliance White Paper","article-title":"Leveraging FIDO Standards to Extend the PKI Security Model in United States Government Agencies","year":"2017","key":"ref25"}],"event":{"name":"2017 International Conference on Public Key Infrastructure and its Applications (PKIA)","start":{"date-parts":[[2017,11,14]]},"location":"Bangalore, India","end":{"date-parts":[[2017,11,15]]}},"container-title":["2017 International Conference on Public Key Infrastructure and its Applications (PKIA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8267902\/8278939\/08278951.pdf?arnumber=8278951","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,29]],"date-time":"2023-03-29T18:23:12Z","timestamp":1680114192000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8278951\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/pkia.2017.8278951","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}