Login / Signup

An approach for evaluating trust in X.509 certificates.

Zakia El UahhabiHanan El Bakkali
Published in: ICITST (2016)
Keyphrases
  • trust relationships
  • public key infrastructure
  • trust model
  • access control
  • trust evaluation
  • neural network
  • information retrieval
  • public key
  • internet commerce