Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,264,598 papers from all fields of science
Search
Sign In
Create Free Account
Key signing party
Known as:
Key signing parties
, Key-signing party
, Key-signing parties
Expand
In public-key cryptography, a key signing party is an event at which people present their public keys to others in person, who, if they are confident…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
17 relations
CAcert.org
Commitment scheme
CryptoParty
Cryptographic hash function
Expand
Broader (1)
Key management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
SAC073 - SSAC Comments on Root Zone Key Signing Key Rollover Plan
W. Kumari
,
P. Fältström
2016
Corpus ID: 112246891
2016
2016
A Novel Multi-factor ID-based Designated Verifier Signature scheme
Mike Scott
IACR Cryptology ePrint Archive
2016
Corpus ID: 29500962
. In a classic digital signature scheme, the global community is capable of verifying a signature. In a designated veri(cid:12)er…
Expand
2015
2015
ROSCO: REPOSITORY OF SIGNED CODE
Dorottya Papp
,
Balazs Kocso
,
T. Holczer
,
L. Buttyán
,
Boldizsár Bencsáth
2015
Corpus ID: 11324320
Recent targeted malware attacks, e.g. Stuxnet, Duqu and Flame, have used digitally signed components that appeared to originate…
Expand
2015
2015
Certificate Transparency for Domain Name System Security Extensions
N. Kong
,
D. Gillmor
,
B. Sarikaya
,
Dacheng Zhang
2015
Corpus ID: 132694958
In draft-ietf-trans-rfc6962-bis, a solution (Certificate Transparency) is proposed for publicly logging the existence of…
Expand
2013
2013
Identity-based security systems for vehicular ad-hoc networks
G. Baldini
,
Vincent Mahieu
,
I. N. Fovino
,
Alberto Trombetta
,
Marco Taddeo
International Conference on Connected Vehicles…
2013
Corpus ID: 34289059
Cooperative Intelligent Transport Systems (ITS) based on vehicular car to car ad-hoc networks have been extensively investigated…
Expand
2009
2009
Towards Trustworthy Cryptographic Protection of Airplane Information Assets
Basel Alomair
,
K. Sampigethaya
,
Andrew Clark
,
R. Poovendran
2009
Corpus ID: 3617677
Digital signatures are emerging as accepted solutions for protecting aircraft assets during their storage and distribution over…
Expand
2004
2004
Efficient Key-Evolving Protocol for the GQ Signature
Chen Lu
,
S. Shieh
Journal of information science and engineering
2004
Corpus ID: 18284582
Several key-evolving protocols for the Guillou-Quisquater (GQ) signature have been proposed. However, the computational loads are…
Expand
2003
2003
Why One Signing Key Is Not Enough
J. Hartnett
2003
Corpus ID: 61731160
Digital signatures do not possess completely equivalent properties to physical signatures. An important difference is that a…
Expand
2001
2001
Public key validation for the DNS security extensions
D. Massey
,
E. Lewis
,
Ó. Gudmundsson
,
R. Mundy
,
A. Mankin
Proceedings DARPA Information Survivability…
2001
Corpus ID: 15081736
The deployment of DNS Security (DNSSEC) can only succeed if there is an effective mechanism for DNS public key validation. This…
Expand
2001
2001
Rekeyed Digital Signature Schemes: Damage-containment in the face of key exposure
Michel Abdalla
,
M. Bellare
2001
Corpus ID: 6168113
Motivated by the problem of delegating signing keys to vulnerable mobile devices, we dene rekeyed digital signature schemes. We…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE