Public key infrastructures that satisfy security goals | IEEE Journals & Magazine | IEEE Xplore