Narrow your search
Listing 1 - 10 of 29 << page
of 3
>>
Sort by

Book
PKIA 2017 : proceedings : 2017 International Conference on Public Key Infrastructure and its Applications : 14-15 November 2017, The Chancery Pavilion, Bengaluru, India.
Author:
ISBN: 1538623560 1538623579 Year: 2018 Publisher: New York : IEEE,


Book
2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA) : 9-10 September 2022
Author:
ISBN: 1665488840 1665488832 Year: 2022 Publisher: Piscataway, NJ : IEEE,


Book
AsiaPKC '16 : proceedings of the 3rd ACM International Workshop on Asia Public-Key Cryptography : May 30, 2016, Xi'an, China
Author:
ISBN: 1450342868 Year: 2016 Publisher: New York : ACM,

Applied public key infrastructure
Author:
ISBN: 6610505004 1280505001 9786610505005 1423799690 1607501368 6000003455 1601291175 9781423799696 9781607501367 1586035509 9781586035501 9781280505003 9786000003456 9781601291172 Year: 2005 Publisher: Amsterdam Washington, DC IOS Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Includes topics such as: Public Key Infrastructure (PKI) Operation and Case Study, Non-repudiation, Authorization and Access Control, Authentication and Time-Stamping, Certificate Validation and Revocation, and Cryptographic Applications.


Book
Introduction to identity-based encryption
Author:
ISBN: 1596932392 9781596932395 9781596932388 1596932384 Year: 2008 Publisher: Boston Artech House

Loading...
Export citation

Choose an application

Bookmark

Abstract

"For professionals looking to fully understand and effectively implement identity-based encryption (IBE) technology, this authoritative resource is a smart choice. Until now, details on IBE could only be found scattered throughout journal articles and conference proceedings. This unique volume offers complete, easy-to-understand guidance."--Jacket.

Understanding public-key infrastructure: concepts, standards, and deployment considerations
Authors: ---
ISBN: 157870166X 9781578701667 Year: 1999 Publisher: Indianapolis (Ind.): MacMillan,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computer security. --- Computer networks --- Business enterprises --- Sécurité informatique --- Réseaux d'ordinateurs --- Security measures. --- Sécurité --- Mesures --- Public key infrastructure (Computer security) --- Security measures --- -Computer networks --- -Public key infrastructure (Computer security) --- AA / International- internationaal --- 654 --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer security --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- -Security measures --- Informatieverwerking. Bureautica. --- Distributed processing --- Entreprises --- Sécurité informatique --- Réseaux d'ordinateurs --- Sécurité --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer networks&delete& --- Informatieverwerking. Bureautica --- Computer networks - Security measures --- Business enterprises - Computer networks - Security measures

PKI : implementing and managing E-security
Author:
ISBN: 0072131233 Year: 2001 Publisher: New York : Osborne/McGraw-Hill,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Trust, privacy, and security in digital business : second International conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005 : proceedings
Authors: ---
ISSN: 03029743 ISBN: 3540282246 3540317961 9783540282242 Year: 2005 Volume: 3592 Publisher: Berlin: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Sincerely welcome to the proceedings of the 2nd International Conference on Trust, Privacy, would be and Security in Digital Business, held in Copenhagen, Denmark, from August 22nd till 26th, 2005. This conference was the successor to the successful TrustBus 2004 conference, held in 2004 in conjunction with the DEXA conferences in Zaragoza. It was our goal that this event would be a forum to bring together researchers from academia and commercial developers from industry to discuss the state of the art of technology for establishing trust, privacy, and security in digital business. We thank the attendees for coming to Copenhagen to participate and debate the new emerging advances in this area. The workshop program consisted of one invited talk and 11 regular technical paper sessions. The invited talk and keynote speech was delivered by Hannes Federrath from the Chair for Management of Information Security at the University of Regensburg, Germany, on “Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. The regular paper sessions covered a broad range of topics, from access control issues to electronic auctioning, from trust and protocols to smart cards. The conference attracted over 100 submissions of which the Program Committee accepted 32 papers for presentation and inclusion in the conference proceedings. The authors of the accepted papers come from 16 different countries. The proceedings contain the revised versions of all accepted papers.


Book
Introduction to Public Key Infrastructures
Authors: --- ---
ISBN: 3642406564 3642406572 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures which for example support Internet security by authenticating software downloads and updates. Although PKC does not require the confidential exchange of secret keys, proper management of the private and public keys used in PKC is still of vital importance: the private keys must remain private, and the public keys must be verifiably authentic. So understanding so-called public key infrastructures (PKIs) that manage key pairs is at least as important as studying the ingenious mathematical ideas underlying PKC.  In this book the authors explain the most important concepts underlying PKIs and discuss relevant standards, implementations, and applications. The book is structured into chapters on the motivation for PKI, certificates, trust models, private keys, revocation, validity models, certification service providers, certificate policies, certification paths, and practical aspects of PKI. This is a suitable textbook for advanced undergraduate and graduate courses in computer science, mathematics, engineering, and related disciplines, complementing introductory courses on cryptography. The authors assume only basic computer science prerequisites, and they include exercises in all chapters and solutions in an appendix. They also include detailed pointers to relevant standards and implementation guidelines, so the book is also appropriate for self-study and reference by industrial and academic researchers and practitioners.

Keywords

Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer security. --- Data structures (Computer science). --- E-commerce. --- System safety. --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Systems and Data Security. --- e-Commerce/e-business. --- Security Science and Technology. --- Data structures (Computer science) --- Public key infrastructure (Computer security) --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer security --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Safety, System --- Safety of systems --- Systems safety --- Accidents --- Industrial safety --- Systems engineering --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Prevention

Listing 1 - 10 of 29 << page
of 3
>>
Sort by