Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,400,057 papers from all fields of science
Search
Sign In
Create Free Account
Public key certificate
Known as:
SSL Certificate
, Digital certificates
, Certificate in Computer Programming
Expand
In cryptography, a public key certificate (also known as a digital certificate or identity certificate) is an electronic document used to prove the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Active Directory
Advanced Access Content System
Anti-pharming
Authentication
Expand
Broader (2)
Public key infrastructure
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Trust Darknet: Control and Compromise in the Internet's Certificate Authority Model
Steven B. Roosa
,
Stephen J. Schultze
IEEE Internet Computing
2013
Corpus ID: 2247362
For more than a decade, Internet users have relied on digital certificates issued by certificate authorities to encrypt and…
Expand
Highly Cited
2008
Highly Cited
2008
Can the future EU ETS support wind energy investments
María Isabel Blanco
,
G. Rodrigues
2008
Corpus ID: 19263356
2006
2006
Certifying algorithms for recognizing proper circular-arc graphs and unit circular-arc graphs
Haim Kaplan
,
Yahav Nussbaum
Discrete Applied Mathematics
2006
Corpus ID: 1012455
2005
2005
Classifying Public Key Certificates
Javier López
,
R. Oppliger
,
G. Pernul
European Public Key Infrastructure Workshop
2005
Corpus ID: 3850135
In spite of the fact that there are several companies that (try to) sell public key certificates, there is still no unified or…
Expand
Highly Cited
2004
Highly Cited
2004
A Web Service Architecture for Enforcing Access Control Policies
C. Ardagna
,
E. Damiani
,
S. Vimercati
,
P. Samarati
VODCA@FOSAD
2004
Corpus ID: 4047184
2004
2004
Pride: peer-to-peer reputation infrastructure for decentralized environments
Prashant Dewan
,
P. Dasgupta
WWW Alt. '04
2004
Corpus ID: 13113559
Peer-to-peer (P2P) networks use the fundamental assumption that the nodes in the network will cooperate and will not cheat. In…
Expand
Highly Cited
2000
Highly Cited
2000
Binding identities and attributes using digitally signed certificates
Joon S. Park
,
R. Sandhu
Asia-Pacific Computer Systems Architecture…
2000
Corpus ID: 17375890
A certificate is digitally signed by a certificate authority (CA) to confirm that the information in the certificate is valid and…
Expand
Review
1998
Review
1998
Security concepts and implementation in the Ara mobile agent system
H. Peine
Proceedings Seventh IEEE International Workshop…
1998
Corpus ID: 7454544
We describe the security architecture of the Ara mobile agent platform, after reviewing the relevant aspects of comparable…
Expand
1993
1993
Construction Contract Claims
R. Thomas
1993
Corpus ID: 166368852
Brief History of Construction Contracts and Case Law Choice of Contracts Tender and Acceptance Monitoring Delay and Disruption…
Expand
Highly Cited
1984
Highly Cited
1984
of Electrical and Computer Engineering
S. Prakash
1984
Corpus ID: 110779138
The Department of Electrical and Computer Engineering offers two programs for undergraduate students leading to the bachelor of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required