Using public-key infrastructures for security and risk management | IEEE Journals & Magazine | IEEE Xplore