Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,522,546 papers from all fields of science
Search
Sign In
Create Free Account
Public key infrastructure
Known as:
PKI
, Private Key Infrastructure
, Public-key infrastructure
A public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application delivery network
Authentication
Blockstack
Certificate Management Protocol
Expand
Broader (2)
Public-key cryptography
Transport Layer Security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure
D. Basin
,
Cas J. F. Cremers
,
T. Kim
,
A. Perrig
,
R. Sasse
,
Pawel Szalachowski
IEEE Transactions on Dependable and Secure…
2016
Corpus ID: 21681652
The current Transport Layer Security (TLS) Public-Key Infrastructure (PKI) is based on a weakest-link security model that depends…
Expand
Highly Cited
2014
Highly Cited
2014
Certificateless public key encryption with keyword search
Yanguo Peng
,
Jiangtao Cui
,
Changgen Peng
,
Zuobin Ying
China Communications
2014
Corpus ID: 24508674
Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in-trade for both…
Expand
Highly Cited
2005
Highly Cited
2005
An efficient scheme for authenticating public keys in sensor networks
Wenliang Du
,
Ronghua Wang
,
P. Ning
ACM Interational Symposium on Mobile Ad Hoc…
2005
Corpus ID: 1030429
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks…
Expand
Highly Cited
2005
Highly Cited
2005
Secure and efficient key management in mobile ad hoc networks
Bing Wu
,
Jie Wu
,
E. Fernández
,
M. Ilyas
,
S. Magliveras
IEEE International Parallel and Distributed…
2005
Corpus ID: 747002
Highly Cited
2004
Highly Cited
2004
Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile
S. Tuecke
,
Von Welch
,
D. Engert
,
L. Pearlman
,
M. Thompson
Request for Comments
2004
Corpus ID: 29077933
This document forms a certificate profile for Proxy Certificates, based on X.509 Public Key Infrastructure (PKI) certificates as…
Expand
Review
2004
Review
2004
The advantages of elliptic curve cryptography for wireless security
K. Lauter
IEEE wireless communications
2004
Corpus ID: 206490150
This article provides an overview of elliptic curves and their use in cryptography. The focus is on the performance advantages to…
Expand
Highly Cited
2004
Highly Cited
2004
Ten Risks of PKI
C. Ellison
,
B. Schneier
2004
Corpus ID: 59801306
Highly Cited
2003
Highly Cited
2003
Toward secure key distribution in truly ad-hoc networks
A. Khalili
,
Jonathan Katz
,
W. Arbaugh
Symposium on Applications and the Internet…
2003
Corpus ID: 14276573
Ad-hoc networks - and in particular wireless mobile ad-hoc networks $have unique characteristics and constraints that make…
Expand
2001
2001
The Internet public key infrastructure
M. Benantar
IBM Systems Journal
2001
Corpus ID: 17986251
Long before the advent of electronic systems, different methods of information scrambling were used. Early attempts at data…
Expand
Highly Cited
2000
Highly Cited
2000
Access control meets public key infrastructure, or: assigning roles to strangers
A. Herzberg
,
Y. Mass
,
Joris Mihaeli
,
D. Naor
,
Yiftach Ravid
Proceeding IEEE Symposium on Security and…
2000
Corpus ID: 367608
The Internet enables connectivity between many strangers: entities that don't know each other. We present the Trust Policy…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE