Listing 1 - 10 of 20 | << page >> |
Sort by
|
Choose an application
Choose an application
Choose an application
The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures which for example support Internet security by authenticating software downloads and updates. Although PKC does not require the confidential exchange of secret keys, proper management of the private and public keys used in PKC is still of vital importance: the private keys must remain private, and the public keys must be verifiably authentic. So understanding so-called public key infrastructures (PKIs) that manage key pairs is at least as important as studying the ingenious mathematical ideas underlying PKC. In this book the authors explain the most important concepts underlying PKIs and discuss relevant standards, implementations, and applications. The book is structured into chapters on the motivation for PKI, certificates, trust models, private keys, revocation, validity models, certification service providers, certificate policies, certification paths, and practical aspects of PKI. This is a suitable textbook for advanced undergraduate and graduate courses in computer science, mathematics, engineering, and related disciplines, complementing introductory courses on cryptography. The authors assume only basic computer science prerequisites, and they include exercises in all chapters and solutions in an appendix. They also include detailed pointers to relevant standards and implementation guidelines, so the book is also appropriate for self-study and reference by industrial and academic researchers and practitioners.
Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer security. --- Data structures (Computer science). --- E-commerce. --- System safety. --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Systems and Data Security. --- e-Commerce/e-business. --- Security Science and Technology. --- Data structures (Computer science) --- Public key infrastructure (Computer security) --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer security --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Safety, System --- Safety of systems --- Systems safety --- Accidents --- Industrial safety --- Systems engineering --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Prevention
Choose an application
This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March 2014. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on chosen ciphertext security, re-encryption, verifiable outsourcing, cryptanalysis, identity and attribute-based encryption, enhanced encryption, signature schemes, related-key security, functional authentication, quantum impossibility, privacy, protocols.
Computer science. --- Data encryption (Computer science) --- Data protection. --- Coding theory. --- Computer software. --- Data Encryption. --- Systems and Data Security. --- Coding and Information Theory. --- Algorithm Analysis and Problem Complexity. --- Public key infrastructure (Computer security) --- Engineering & Applied Sciences --- Computer Science --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Software, Computer --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Informatics --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computer Science. --- Computer security --- Cryptology. --- Computer systems --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Cryptography --- Protection --- Security measures --- Information theory. --- Algorism --- Algebra --- Arithmetic --- Communication theory --- Communication --- Cybernetics --- Foundations
Choose an application
This volume contains papers presented at TRUST 2008, the ?rst international conference on Trusted Computing and Trust in Information Technologies, held in March 2008 in Villach, Austria. The aim of the conference was to create a joint scienti?c and networking platform covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international research groups and projects in closely related ?elds. The organizers received 43 submissions from 17 countries. Each of the s- mittedpaperswasreviewedbythreereviewers.Basedonthesereviews13papers were selected as suitable for the conference and the authors were asked to p- sent their work. Further, six renowned speakers from academia, industry and the European Commission were invited for keynotes. The accepted papers are published in this volume together with one paper from Paul England, one of the invited speakers at TRUST 2008. TheconferencewassupportedbytheEuropeanCommissionviatheOpen-TC project (FP6 IST-027635), by the Austrian Research Promotion Agency (FFG) and by the city of Villach.
Computer security --- Data encryption (Computer science) --- Public key infrastructure (Computer security) --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer security. --- Computer Communication Networks. --- Software engineering. --- Data encryption (Computer science). --- Computer science. --- Systems and Data Security. --- Software Engineering. --- Cryptology. --- Information Systems Applications (incl. Internet). --- User Interfaces and Human Computer Interaction. --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer software engineering --- Engineering --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computer communication systems. --- Application software. --- User interfaces (Computer systems). --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing
Choose an application
This book constitutes the refereed proceedings of the 5th International Conference on Trust and Privacy in Digital Business, TrustBus 2008, held in Turin, Italy, in September 2008 in conjunction with DEXA 2008. The 18 revised full papers presented together with 1 invited keynote lecture were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on trust, authentication, authorization and access control, reputation systems, security policies and identity management, intrusion detection and applications of game theory to IT security problems, and privacy.
Public key infrastructure (Computer security) --- Data transmission systems --- Electronic commerce --- Business enterprises --- Computer security --- Security measures --- Computer networks --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Data communication systems --- Transmission of data --- Digital communications --- Electronic data processing --- Electronic systems --- Information theory --- Telecommunication systems --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer science. --- Information Systems. --- Data encryption (Computer science). --- Computer Communication Networks. --- Computer security. --- Information technology. --- Computers and Society. --- Management of Computing and Information Systems. --- Cryptology. --- Systems and Data Security. --- IT in Business. --- Informatics --- Science --- IT (Information technology) --- Technology --- Telematics --- Knowledge management --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Protection --- Computers and civilization. --- Management information systems. --- Computer communication systems. --- Business—Data processing. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Distributed processing --- Communication systems
Choose an application
Sincerely welcome to proceedings of the 1st International Conference on Trust and Privacy in Digital Business, Zaragoza, Spain, held from August 30th to September 1st, 2004. This conference was an outgrowth of the two successful TrustBus inter- tional workshops, held in 2002 and 2003 in conjunction with the DEXA conferences in Aix-en-Provence and in Prague. Being the first of a planned series of successful conferences it was our goal that this event would initiate a forum to bring together researchers from academia and commercial developers from industry to discuss the state of the art of technology for establishing trust and privacy in digital business. We thank you all the attendees for coming to Zaragoza to participate and debate the new emerging advances in this area. The conference program consisted of one invited talk and nine regular technical papers sessions. The invited talk and keynote speech was delivered by Ahmed Patel from the Computer Networks and Distributed Systems Research Group, University College Dublin, Ireland on “Developing Secure, Trusted and Auditable Services for E-Business: An Autonomic Computing Approach”. A paper covering his talk is also contained in this book. The regular paper sessions covered a broad range of topics, from access control - sues to electronic voting, from trust and protocols to digital rights management. The conference attracted close to 100 submissions of which the program committee - cepted 29 papers for presentation and inclusion in the conference proceedings.
Computer security --- Public key infrastructure (Computer security) --- Data transmission systems --- Electronic commerce --- Business enterprises --- Security measures --- Computer networks --- Computer science. --- Computer Communication Networks. --- Operating systems (Computers). --- Data encryption (Computer science). --- Information Systems. --- Management information systems. --- Computer Science. --- Computers and Society. --- Operating Systems. --- Data Encryption. --- Management of Computing and Information Systems. --- Business Information Systems. --- Computer Science --- Engineering & Applied Sciences --- Public key infrastructure (Computer networks) --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Data communication systems --- Transmission of data --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Business. --- Management science. --- Computer communication systems. --- Computers and civilization. --- Business and Management. --- Business and Management, general. --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Quantitative business analysis --- Problem solving --- Operations research --- Statistical decision --- Trade --- Economics --- Commerce --- Industrial management --- Communication systems --- Operating systems --- Distributed processing --- Business --- Information superhighway --- Information theory --- Telecommunication systems --- Cryptology. --- Computer networks. --- Operating systems (Computers) --- Data encryption (Computer science)
Choose an application
This book constitutes the refereed proceedings of the First European Public Key Infrastructure Workshop: Research and Applications, EuroPKI 2004, held on Samos Island, Greece in June 2004. The 25 revised full papers and 5 revised short papers presented were carefully reviewed and selected from 73 submissions. The papers address all current issues in PKI, ranging from theoretical and foundational topics to applications and regulatory issues in various contexts.
Computer science. --- Data encryption (Computer science). --- Computer software. --- Information storage and retrieval systems. --- Information systems. --- Information Systems. --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Information Storage and Retrieval. --- Information Systems Applications (incl.Internet). --- Computers and Society. --- Management of Computing and Information Systems. --- Public key infrastructure (Computer security) --- Computer Science --- Engineering & Applied Sciences --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Algorithms. --- Information storage and retrieval. --- Computers and civilization. --- Management information systems. --- Information Systems Applications (incl. Internet). --- Computer security --- Information storage and retrieva. --- Cryptology. --- Informatics --- Science --- Software, Computer --- Computer systems --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Algorism --- Algebra --- Arithmetic --- Communication systems --- Foundations --- Data encryption (Computer science)
Choose an application
Today, PKIs have come of age and they support the security of several large networked systems, such as company-wide document management systems,- governmentapplicationsandsecureVPN.However,despitethissuccess,the?eld has not yet reachedits full scienti?c maturity and there is still room for research in this area. For example, open issues exist in the e?cient management of large PKI (especially with respect to certi?cate validation), better performance could be attained by improved cryptographic techniques and innovative applications are continuously proposed. To discuss progress in the PKI ?eld, the European PKI workshop series was established in 2004, following similar initiatives in Asia and the USA. The ?rst two events of this series took place on the Island of Samos, Greece (EuroPKI 2004), and in Canterbury, UK (EuroPKI 2005). This book contains the proceedings of the Third European PKI Workshop (EuroPKI 2006), held at the Politecnico di Torino, Italy, on June 19-20, 2006. In response to the Call for Papers, about 50 submissions were received. All submissions werereviewed by at least two reviewers(external or members of the Program Committee) and most of them got three reviews. At the end of this process, 22 papers were selected, 18 in their full form and 4 as short papers. These papers led to a lively workshop, with a good mixture between theory and application, continuing the success of the previous workshops in the series.
Public key cryptography --- Data encryption (Computer science) --- Computer security --- Computer networks --- Cryptographie à clé publique --- Chiffrement (Informatique) --- Sécurité informatique --- Réseaux d'ordinateurs --- Congresses. --- Security measures --- Congrès --- Sécurité --- Mesures --- Public key infrastructure (Computer security) --- Computer Science --- Engineering & Applied Sciences --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Information storage and retrieval. --- Computers and civilization. --- Computer Science. --- Computer Communication Networks. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Information Storage and Retrieval. --- Information Systems Applications (incl. Internet). --- Computers and Society. --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Foundations --- Distributed processing --- Computer software. --- Information storage and retrieva. --- Cryptology. --- Software, Computer --- Computer systems --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
Public key infrastructure (Computer security) --- Data transmission systems --- Electronic commerce --- Business enterprises --- Infrastructure à clé publique (Sécurité informatique) --- Données --- Commerce électronique --- Entreprises --- Congresses. --- Security measures --- Computer networks --- Congrès --- Transmissions --- Sécurité --- Mesures --- Réseaux d'ordinateurs --- Computer Science --- Engineering & Applied Sciences --- Data communication systems --- Transmission of data --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Computer science. --- Information technology. --- Business --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Management information systems. --- Computer Science. --- Computers and Society. --- Management of Computing and Information Systems. --- Data Encryption. --- Computer Communication Networks. --- Systems and Data Security. --- IT in Business. --- Data processing. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Informatics --- Science --- Communication systems --- Protection --- Distributed processing --- Information theory --- Telecommunication systems --- Information Systems. --- Cryptology. --- Business—Data processing. --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security)
Listing 1 - 10 of 20 | << page >> |
Sort by
|