Skip to search formSkip to main contentSkip to account menu

Self-signed certificate

Known as: Self signed certificate, Self-signed certificates 
In cryptography and computer security, a self-signed certificate is an identity certificate that is signed by the same entity whose identity it… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
We are currently witnessing an alarmingly increasing array of attacks on secure infrastructures used for industrial and… 
2012
2012
Trust management in peer-to-peer (P2P) networks is a current topic. Most of the current work focuses on a “clean routing table… 
2011
2011
This document specifies a Transport Layer Security (TLS) extension and associated semantics that allow clients and servers to… 
2009
2009
  • R. Savola
  • 2009
  • Corpus ID: 14705431
Self-organization introduces major challenges to security and trust management in mobile ad hoc networks. In addition, security… 
2009
2009
Voice-over-IP protocols (e.g., SIP) are vulnerable to many types of attacks. One core challenge in preventing VoIP attacks is to… 
Review
2009
Review
2009
Security and manageability are two primary pillars of Intel® Active Management Technology (Intel® AMT). The hardware-based… 
2007
2007
Collaborative applications like video/audio conferencing, IP telephony, file sharing, collaborative work spaces, and multi-user… 
2007
2007
Online banking and e-commerce applications have good protection against attacks directed direct towards their computer systems…