Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,400,060 papers from all fields of science
Search
Sign In
Create Free Account
Self-signed certificate
Known as:
Self signed certificate
, Self-signed certificates
In cryptography and computer security, a self-signed certificate is an identity certificate that is signed by the same entity whose identity it…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
22 relations
Attack surface
CAcert.org
Certificate authority
Computer security
Expand
Broader (2)
Key management
Public key infrastructure
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Trust coercion in the name of usable public key infrastructure
Dimitrios Zissis
,
D. Lekkas
Secur. Commun. Networks
2014
Corpus ID: 7905512
We are currently witnessing an alarmingly increasing array of attacks on secure infrastructures used for industrial and…
Expand
2012
2012
Analysis and optimization of routing trust values in a Kademlia-based Distributed Hash Table in a malicious environment
M. Kohnen
Baltic Congress on Future Internet Communications
2012
Corpus ID: 17369504
Trust management in peer-to-peer (P2P) networks is a current topic. Most of the current work focuses on a “clean routing table…
Expand
2011
2011
TLS Origin-Bound Certificates
A. Barth
,
D. Balfanz
2011
Corpus ID: 199587523
This document specifies a Transport Layer Security (TLS) extension and associated semantics that allow clients and servers to…
Expand
2009
2009
Node Level Security Management and Authentication in Mobile Ad Hoc Networks
R. Savola
Tenth International Conference on Mobile Data…
2009
Corpus ID: 14705431
Self-organization introduces major challenges to security and trust management in mobile ad hoc networks. In addition, security…
Expand
2009
2009
Detecting Trustworthy Real-Time Communications Using a Web-of-Trust
J. Seedorf
,
Nico d'Heureuse
,
S. Niccolini
,
M. Cornolti
Global Communications Conference
2009
Corpus ID: 14439678
Voice-over-IP protocols (e.g., SIP) are vulnerable to many types of attacks. One core challenge in preventing VoIP attacks is to…
Expand
Review
2009
Review
2009
Configuring Intel® Active Management Technology
D. Eldar
,
Purushottam Goel
2009
Corpus ID: 17304997
Security and manageability are two primary pillars of Intel® Active Management Technology (Intel® AMT). The hardware-based…
Expand
2007
2007
Integrated Framework for Authentication and Access Control in Peer to Peer Groups
M. Chatterjee
2007
Corpus ID: 10528810
Collaborative applications like video/audio conferencing, IP telephony, file sharing, collaborative work spaces, and multi-user…
Expand
2007
2007
Exploring Phishing Attacks and Countermeasures
A. Persson
2007
Corpus ID: 16395579
Online banking and e-commerce applications have good protection against attacks directed direct towards their computer systems…
Expand
2006
2006
A framework for seamless service interworking in ad-hoc networks
Linda Källström
,
Simone Leggio
,
+5 authors
Antti Ylä-Jääski
Computer Communications
2006
Corpus ID: 3139278
2000
2000
MicroISPs: providing convenient and low-cost high-bandwidth Internet access
J. Brustoloni
,
J. Garay
Comput. Networks
2000
Corpus ID: 18690376
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE