Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,289,934 papers from all fields of science
Search
Sign In
Create Free Account
Keystore
Known as:
Java KeyStore
, Java key store
, Keytool
A Java KeyStore (JKS) is a repository of security certificates – either authorization certificates or public key certificates – plus corresponding…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Authorization certificate
Certificate authority
IBM 4764
IBM WebSphere Application Server
Expand
Broader (1)
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Security evaluation of Android Keystore
Γεώργιος Κασαγιάννης
2018
Corpus ID: 70327013
This thesis was prepared in such a way that anyone – with basic Android and Security knowledge – can understand the problems…
Expand
2016
2016
The Digital Inheritance of Mobile Apps: Where’s the App for That?
E. Cruz
2016
Corpus ID: 147310573
Digital inheritance laws relating to mobile applications are largely unsettled as courts and legislatures grapple with how to…
Expand
2015
2015
Investigating weaknesses in Android certificate security
Daniel E. Krych
,
Stephen Lange-Maney
,
P. Mcdaniel
,
W. Glodek
Defense + Security Symposium
2015
Corpus ID: 27342847
Android's application market relies on secure certificate generation to establish trust between applications and their users; yet…
Expand
2014
2014
Secure SAML validation to prevent XML signature wrapping attacks
P. Krawczyk
arXiv.org
2014
Corpus ID: 33872685
SAML assertions are becoming popular method for passing authentication and authorisation information between identity providers…
Expand
2014
2014
On Secure Data Deletion
Joel Reardon
,
D. Basin
,
Srdjan Capkun
IEEE Security and Privacy
2014
Corpus ID: 261290606
Secure data deletion is the task of deleting data from a physical medium, such as a hard drive, phone, or blackboard, so that the…
Expand
2010
2010
Assuring integrity and confidentiality for pseudonymized health data
Bernhard Riedl
,
Veronika Grascher
International Conference on Electrical…
2010
Corpus ID: 9739734
Nowadays, the development in demographics results in increased costs for providing services in health care systems. Recent…
Expand
2009
2009
A Security Framework for JXTA-Overlay
Estudis d’Informàtica
2009
Corpus ID: 174795244
At present time, the maturity of P2P research field has pushed through new problems such us those related with security. For that…
Expand
Review
2008
Review
2008
JXTA security in basic peer operations
J. Moreno
,
Jordi Herrera Joancomartí
2008
Corpus ID: 55754165
JXTA is an open-source initiative that allows to specify a set of collaboration and communication protocols which enable the…
Expand
2005
2005
Smart card authentication and authorization framework
Saurabh Bhatla
2005
Corpus ID: 61357436
...................................................................................................................... vi TABLE…
Expand
2003
2003
Secure HTTP, using and creating certificates
Bruce Mechtly
2003
Corpus ID: 216006858
This workshop will introduce the participant to the use of the HTTPS protocol to provide secure web service with common web…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE