[PDF][PDF] Creating virtual hierarchy in peer-to-peer PKI to simplify certificate path discovery

B Muniyal, KV Prema, S Nayak - International Journal of …, 2012 - researchgate.net
ABSTRACT Peer-to-Peer Public Key Infrastructure (also called Mesh PKI) architecture is one
of the most popular PKI trust models that is widely used in Mobile Ad-hoc networks …

[BUCH][B] Contribución a la validación de certificados en arquitecturas de autenticación y autorización

IC Satizábal Echevarria - 2007 - upcommons.upc.edu
Las arquitecturas de autenticación y autorización basadas en certificados no han sido
ampliamente aceptadas debido a su costo, inflexibilidad y difícil manejo. Uno de los …

An efficient method to merge hierarchical public key infrastructures

B Muniyal, PK Venkat Reddy - International Journal of Computers …, 2010 - Taylor & Francis
Security threats are most common in e-commerce and e-business transactions. Public key
infrastructure (PKI) is a framework on which the security services are established. It can …

Design and Implementation of an Efficient Method for Certificate Path Verification in Hierarchical Public Key Infrastructures

Balachandra, KV Prema - International Conference on Business …, 2010 - Springer
In order to challenge the security threats for e-commerce and e-business transactions,
robust and trustworthy security systems are required. Public Key Infrastructure (PKI) is a …

[ZITATION][C] Balachandra Muniyal Prema K. V

S Nayak - 2012

[ZITATION][C] Certificate Path Verification in Hierarchical and Peer-to-Peer Public Key Infrastructures

KV Prema - Journal of Technology Management for Growing …, 2010