Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,276,776 papers from all fields of science
Search
Sign In
Create Free Account
Relying party
A relying party (RP) is a computer term used to refer to a server providing access to a secure software application. Claims-based applications, where…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Certification path validation algorithm
Claims-based identity
Electronic authentication
Information Card
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
BGPcoin: Blockchain-Based Internet Number Resource Authority and BGP Security Solution
Qianqian Xing
,
Baosheng Wang
,
Xiaofeng Wang
Symmetry
2018
Corpus ID: 53525419
Without the design for inherent security, the Border Gateway Protocol (BGP) is vulnerable to prefix/subprefix hijacks and other…
Expand
2018
2018
True2F: Backdoor-Resistant Authentication Tokens
Emma Dauterman
,
Henry Corrigan-Gibbs
,
David Mazières
,
D. Boneh
,
Dominic Rizzo
IEEE Symposium on Security and Privacy
2018
Corpus ID: 52955200
We present True2F, a system for second-factor authentication that provides the benefits of conventional authentication tokens in…
Expand
2017
2017
Authenticated Confidential Channel Establishment and the Security of TLS-DHE
Tibor Jager
,
Florian Kohlar
,
Sven Schäge
,
Jörg Schwenk
Journal of Cryptology
2017
Corpus ID: 26322948
Transport Layer Security (TLS) is the most important cryptographic protocol in use today. However, finding a cryptographic…
Expand
2013
2013
Global Authentication in an Untrustworthy World
M. Abadi
,
Andrew Birrell
,
Ilya Mironov
,
Ted Wobber
,
Yinglian Xie
USENIX Workshop on Hot Topics in Operating…
2013
Corpus ID: 12907130
With the advent in the 1980's of truly global hierarchical naming (via the Domain Name Service), security researchers realized…
Expand
2013
2013
The Evolution of Authentication
Rolf Lindemann
Information Security Solutions Europe
2013
Corpus ID: 14533637
An analysis of 6 million accounts showed that 10,000 common passwords would have access to 99.8% of the accounts. When looking at…
Expand
Highly Cited
2009
Highly Cited
2009
Privacy-Enhanced User-Centric Identity Management
Gail-Joon Ahn
,
Moonam Ko
,
Mohamed Shehab
IEEE International Conference on Communications
2009
Corpus ID: 7314624
User-centric identity management approaches have received significant attention for managing private and critical identity…
Expand
2006
2006
Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKI
Meiyuan Zhao
,
Sean W. Smith
European Public Key Infrastructure Workshop
2006
Corpus ID: 12327130
Establishing trust on certificates across multiple domains requires an efficient certification path discovery algorithm…
Expand
Highly Cited
2005
Highly Cited
2005
The Laws of Identity
Kim Cameron
,
Andre Durand
,
+33 authors
William Heath
2005
Corpus ID: 152760429
This paper is about how we can prevent the loss of trust and go forward to give Internet users a deep sense of safety, privacy…
Expand
2003
2003
Establishing and managing trust within the public key infrastructure
D. Lekkas
Computer Communications
2003
Corpus ID: 9427551
2001
2001
Relying Party Credentials Framework
A. Herzberg
,
Y. Mass
Electronic Commerce Research
2001
Corpus ID: 10469459
We present architecture for a relying-party to manage credentials, and in particular to map different credentials into common…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE