Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Certification path validation algorithm

The certification path validation algorithm is the algorithm which verifies that a given certificate path is valid under a given public key… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
This document defines a standard profile for X.509 certificates used to enable validation of Autonomous System (AS) paths in the… Expand
2015
2015
During development of the UMTS security standard, many protocols have been proposed to secure the UMTS AKA. Although these… Expand
  • table I
  • table II
  • figure 1
  • figure 2
  • table III
2009
2009
In this paper, we describe the challenges and a potential solution for validating public key (PKI) certificates associated with… Expand
  • figure 1
  • figure 2
  • figure 3
2008
2008
Certification path validation is a complex task that implies high computational cost. In this process is necessary to verify the… Expand
  • table 1
  • figure 1
  • figure 2
  • table 2
  • figure 3
Highly Cited
2007
Highly Cited
2007
With the advent of wireless communication and internet protocol, many technologies have been developed to provide mobile phone… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
2007
2007
PKI can improve security of mobile payments but its complexity has made difficult its use in such environment. Certificate path… Expand
2005
2005
A fast algorithm to execute path validation of the X.509 Certificate was developed. The algorithm used not only certificates and… Expand
2004
2004
Certificate-based authentication of parties provides a powerful means for verifying claimed identities, since communicating… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
2004
2004
Certificate-based authentication of parties provides a powerful means for verifying claimed identities, since communicating… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
2004
2004
Most applications using the PKI allows a user to execute the certificate validation processing. The efficiency of user system can… Expand