Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 222,814,974 papers from all fields of science
Search
Sign In
Create Free Account
X.509
Known as:
X509v3
, X509
, UIT X.509
Expand
In cryptography, X.509 is an important standard for a public key infrastructure (PKI) to manage digital certificates and public-key encryption and a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Accounts & SSO
Builder pattern
Certificate authority
Certificate policy
Expand
Broader (1)
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2007
Highly Cited
2007
Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce
Yong Lee
,
Jaeil Lee
,
Joo-Seok Song
Computer Communications
2007
Corpus ID: 8628551
2006
2006
Securing AD-HOC networks using IPSec
Yuanhui Ning
2006
Corpus ID: 195918061
The use of IPSec for securing communication between nodes of wireless and mobile AD-HOC networks has traditionally been…
Expand
2006
2006
Efficient and User Friendly Inter-domain Device Authentication/Access Control for Home Networks
Jin-Bum Hwang
,
Hyung-Kyu Lee
,
J. Han
IFIP International Conference on Embedded and…
2006
Corpus ID: 13936023
Device authentication can reinforce the security of the home network services by ensuring that only specific authorized devices…
Expand
Highly Cited
2005
Highly Cited
2005
Negotiating Trust on the Grid
J. Basney
,
W. Nejdl
,
D. Olmedilla
,
Von Welch
,
M. Winslett
Semantic Grid
2005
Corpus ID: 15708570
Grids support dynamically evolving collections of resources and users, usually spanning multiple administrative domains. The…
Expand
2004
2004
Introduction to Real-Time Ethernet II
P. Doyle
2004
Corpus ID: 10341333
Real-time electronic distributed control systems are an important development of the technological evolution. Electronics are…
Expand
Highly Cited
2003
Highly Cited
2003
Web Services Security (WS-Security)
Bob Atkinson
2003
Corpus ID: 166854042
WS-Security describes enhancements to SOAP messaging to provide quality of protection through message integrity, message…
Expand
Review
2003
Review
2003
The X.509 Privilege Management Infrastructure
D. Chadwick
2003
Corpus ID: 60950002
This paper provides an overview of the Privilege Management Infrastructure (PMI) introduced in the 2000 edition of X.509. It…
Expand
Highly Cited
2001
Highly Cited
2001
Building Certification Paths: Forward vs. Reverse
Yassir Elley
,
A. Anderson
,
S. Hanna
,
Sean Mullan
,
R. Perlman
,
Seth Proctor
2001
Corpus ID: 17585920
In general, building and validating a certification path connecting a trust anchor to a target can be a very time-consuming…
Expand
Highly Cited
2000
Highly Cited
2000
The structure of vanadium oxide species on γ-alumina; an in situ X-ray absorption study during catalytic oxidation
M. Ruitenbeek
,
A. J. van Dillen
,
F. D. de Groot
,
I. Wachs
,
J. Geus
,
D. Koningsberger
2000
Corpus ID: 27761218
The mechanism of catalytic oxidation reactions was studied using in situ X-ray absorption spectroscopy (XAFS) over a 17.5 wt…
Expand
1999
1999
Scalable Access Control for Distributed Object Systems
D. Sterne
,
G. Tally
,
+4 authors
E. Sebes
USENIX Security Symposium
1999
Corpus ID: 18440003
A key obstacle to the widespread use of distributed object oriented systems is the lack of scalable access control mechanisms. It…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE