Narrow your search

Library

LUCA School of Arts (3)

Odisee (3)

Thomas More Kempen (3)

Thomas More Mechelen (3)

UCLL (3)

VIVES (3)

VUB (3)

KU Leuven (1)

UGent (1)


Resource type

book (3)


Language

English (3)


Year
From To Submit

2008 (1)

2005 (1)

2000 (1)

Listing 1 - 3 of 3
Sort by
Applied public key infrastructure
Author:
ISBN: 6610505004 1280505001 9786610505005 1423799690 1607501368 6000003455 1601291175 9781423799696 9781607501367 1586035509 9781586035501 9781280505003 9786000003456 9781601291172 Year: 2005 Publisher: Amsterdam Washington, DC IOS Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Includes topics such as: Public Key Infrastructure (PKI) Operation and Case Study, Non-repudiation, Authorization and Access Control, Authentication and Time-Stamping, Certificate Validation and Revocation, and Cryptographic Applications.


Book
Introduction to identity-based encryption
Author:
ISBN: 1596932392 9781596932395 9781596932388 1596932384 Year: 2008 Publisher: Boston Artech House

Loading...
Export citation

Choose an application

Bookmark

Abstract

"For professionals looking to fully understand and effectively implement identity-based encryption (IBE) technology, this authoritative resource is a smart choice. Until now, details on IBE could only be found scattered throughout journal articles and conference proceedings. This unique volume offers complete, easy-to-understand guidance."--Jacket.

Rethinking public key infrastructures and digital certificates
Author:
ISBN: 0262269139 1423725344 9780262269131 9780262024914 0262024918 Year: 2000 Publisher: Cambridge, Mass. MIT Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security.As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts believe that digital certificates offer the best technology for safeguarding electronic communications. They are already widely used for authenticating and encrypting email and software, and eventually will be built into any device or piece of software that must be able to communicate securely. There is a serious problem, however, with this unavoidable trend: unless drastic measures are taken, everyone will be forced to communicate via what will be the most pervasive electronic surveillance tool ever built. There will also be abundant opportunity for misuse of digital certificates by hackers, unscrupulous employees, government agencies, financial institutions, insurance companies, and so on.In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens: anyone can establish their validity and the data they specify, but no more than that. Furthermore, different actions by the same person cannot be linked. Certificate holders have control over what information is disclosed, and to whom. Subsets of the proposed cryptographic building blocks can be used in combination, allowing a cookbook approach to the design of public key infrastructures. Potential applications include electronic cash, electronic postage, digital rights management, pseudonyms for online chat rooms, health care information storage, electronic voting, and even electronic gambling.

Keywords

Computer networks --- Computer network protocols. --- Data encryption (Computer science) --- Computer security. --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Security measures. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Protocols, Computer network --- Computer network security --- Network security, Computer --- Security of computer networks --- Security measures --- Protection of computer systems --- Protection --- Data protection --- Security systems --- Hacking --- Computer security --- Cryptography --- COMPUTER SCIENCE/General --- Public key infrastructure (Computer security) --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer network protocols --- -Data encryption (Computer science) --- 681.3*D46 --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing

Listing 1 - 3 of 3
Sort by