Design and implementation of an efficient method for certificate path verification in hierarchical public key infrastructures

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In order to challenge the security threats for e-commerce and e-business transactions, robust and trustworthy security systems are required. Public Key Infrastructure (PKI) is a frame work on which the security services are established. Most of the business corporations deploy Hierarchical PKI as their security infrastructure, in which, certificate path is unidirectional, so certificate path development and validation is simple and straight forward. In this paper, we propose a novel method for certificate path verification in Hierarchical Public Key Infrastructures and compare the experimental results with the existing certificate Path verification methods. © 2010 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Balachandra, & Prema, K. V. (2010). Design and implementation of an efficient method for certificate path verification in hierarchical public key infrastructures. In Communications in Computer and Information Science (Vol. 70, pp. 320–324). Springer Verlag. https://doi.org/10.1007/978-3-642-12214-9_51

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free