Certification path validation algorithm

The certification path validation algorithm is the algorithm which verifies that a given certificate path is valid under a given public key… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1998-2015
01219982015

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
The number of Sustainable Green Ecosystem Council (SGEC) certified forests in Japan has increased in recent years. As such it is… (More)
  • table 1
  • table 2
  • figure 1
  • table 3
  • table 4
Is this relevant?
2014
2014
We are currently witnessing an alarmingly increasing array of attacks on secure infrastructures used for industrial and… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
Is this relevant?
2009
2009
  • Nabil A. Ghadiali
  • 2009
In this paper, we describe the challenges and a potential solution for validating public key (PKI) certificates associated with… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2008
2008
Certification path validation is a complex task that implies high computational cost. In this process is necessary to verify the… (More)
  • table 1
  • figure 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
2007
2007
Web services specification provides an open standard for the distributed service oriented architecture. It is widely used in… (More)
  • figure 2
  • figure 1
Is this relevant?
2005
2005
In this paper, we present an initial approach to the problem of specifying formally the requirements of the Certification Policy… (More)
  • figure 2
Is this relevant?
2004
2004
Certificate-based authentication of parties provides a powerful means for verifying claimed identities, since communicating… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2004
2004
Certificate-based authentication of parties provides a powerful means for verifying claimed identities, since communicating… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2003
2003
In the current public-key infrastructure (PKI) schemes based on X.509, a relying party must validate a user’s certificate as well… (More)
  • figure 1
  • figure 2
Is this relevant?
Review
1999
Review
1999
Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests… (More)
  • figure 1
Is this relevant?