Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,027,963 papers from all fields of science
Search
Sign In
Create Free Account
Implicit certificate
Known as:
Implicit Certificates
In cryptography, implicit certificates are a variant of public key certificate, such that a public key can be reconstructed from any implicit…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Certificate authority
Cryptographic hash function
Cryptography
Digital signature
Expand
Broader (1)
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Improved anonymous group implicit certificate scheme
N. M. Rabadi
Consumer Communications and Networking Conference
2011
Corpus ID: 14670614
We propose a broadcast communication protocol for networks that require users' anonymity and authentication. Recipients of a…
Expand
2010
2010
Anonymous Group Implicit Certificate Scheme
N. M. Rabadi
7th IEEE Consumer Communications and Networking…
2010
Corpus ID: 17774199
We propose an anonymous identity-based public key group implicit certificate scheme to preserve the anonymity of mobile users in…
Expand
2010
2010
Implicit certificates support in IEEE 1609 security services for Wireless Access in Vehicular Environment (WAVE)
N. M. Rabadi
The 7th IEEE International Conference on Mobile…
2010
Corpus ID: 28831362
In the near future, vehicles will exchange safety-critical information messages wirelessly with other vehicles on the road and…
Expand
2010
2010
Revised self-certified implicit certificate scheme for anonymous communications in vehicular networks
N. M. Rabadi
IEEE Vehicular Networking Conference
2010
Corpus ID: 18467987
A self-certified implicit certificate has desirable features which are suitable for use in constrained environments such as in…
Expand
2010
2010
Self-certified public key implicit certificate scheme for drivers' anonymity in Vehicle-to-Vehicle communication networks
N. M. Rabadi
SoutheastCon
2010
Corpus ID: 37577283
In Vehicle-to-Vehicle (V2V) communication networks, vehicles will broadcast their safety-critical information, such as speed…
Expand
2010
2010
Constructing efficient certificate-based encryption scheme with pairing in the standard model
Yang Lu
,
Jiguo Li
IEEE International Conference on Information…
2010
Corpus ID: 18784177
Certificate-based encryption (CBE) is a new asymmetric encryption paradigm which combines traditional public-key encryption (PKE…
Expand
2009
2009
An Identity-based and Threshold Key Management Scheme for Ad Hoc Networks
Hua Sun
,
Xue-feng Zheng
,
Zhongjun Deng
International Conference on Networks Security…
2009
Corpus ID: 14745055
This paper studies key management, a fundamental problem in securing mobile ad hoc networks (MANETs). We present the key…
Expand
2009
2009
Forward-Secure Certificate-Based Encryption
Yang Lu
,
Jiguo Li
Fifth International Conference on Information…
2009
Corpus ID: 2441757
Certificate-based encryption (CBE) is a new paradigm which overcomes the shortcomings of traditional public-key encryption (PKE…
Expand
2007
2007
Implicit certificate verification
马瑞内斯·斯特林克
2007
Corpus ID: 68190219
A method of computing a cryptographic key to be shared between a pair of correspondents communicating with one another through a…
Expand
2000
2000
A wearable public key infrastructure (WPKI)
N. Smart
,
Henk L. Muller
Digest of Papers. Fourth International Symposium…
2000
Corpus ID: 10975507
We describe the design and implementation of public key infrastructure for the Bristol University Cyberjacket and three initial…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE