Listing 1 - 10 of 29 | << page >> |
Sort by
|
Choose an application
Choose an application
Choose an application
Public key infrastructure (Computer security) --- Public key cryptography --- Data encryption (Computer science) --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Cryptography --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer security
Choose an application
Includes topics such as: Public Key Infrastructure (PKI) Operation and Case Study, Non-repudiation, Authorization and Access Control, Authentication and Time-Stamping, Certificate Validation and Revocation, and Cryptographic Applications.
Public key infrastructure (Computer security) --- Public key cryptography --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Cryptography --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer security
Choose an application
"For professionals looking to fully understand and effectively implement identity-based encryption (IBE) technology, this authoritative resource is a smart choice. Until now, details on IBE could only be found scattered throughout journal articles and conference proceedings. This unique volume offers complete, easy-to-understand guidance."--Jacket.
Data encryption (Computer science) --- Public key cryptography. --- Public key infrastructure (Computer security) --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer security --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Cryptography --- Data encoding (Computer science) --- Encryption of data (Computer science)
Choose an application
Computer architecture. Operating systems --- Information systems --- Computer networks --- Computer security --- Public key infrastructure (Computer security) --- Web services --- 681.3 *C2 --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- Computer communication networks: data communications; OSI; security and protection --- Application software --- Cloud computing --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Security measures --- Protection
Choose an application
Computer security. --- Computer networks --- Business enterprises --- Sécurité informatique --- Réseaux d'ordinateurs --- Security measures. --- Sécurité --- Mesures --- Public key infrastructure (Computer security) --- Security measures --- -Computer networks --- -Public key infrastructure (Computer security) --- AA / International- internationaal --- 654 --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer security --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- -Security measures --- Informatieverwerking. Bureautica. --- Distributed processing --- Entreprises --- Sécurité informatique --- Réseaux d'ordinateurs --- Sécurité --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer networks&delete& --- Informatieverwerking. Bureautica --- Computer networks - Security measures --- Business enterprises - Computer networks - Security measures
Choose an application
Computer networks --- Computers --- Computer security --- Public key cryptography --- Réseaux d'ordinateurs --- Sécurité informatique --- Cryptographie à clé publique --- Security measures --- Access control --- Sécurité --- Mesures --- Public key infrastructure (Computer security) --- -681.3*D46 --- 005.8 --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Distributed processing --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Computer security. --- Réseaux d'ordinateurs --- Sécurité informatique --- Cryptographie à clé publique --- Sécurité --- 681.3*D46 --- Computer network security --- Network security, Computer --- Security of computer networks
Choose an application
Sincerely welcome to the proceedings of the 2nd International Conference on Trust, Privacy, would be and Security in Digital Business, held in Copenhagen, Denmark, from August 22nd till 26th, 2005. This conference was the successor to the successful TrustBus 2004 conference, held in 2004 in conjunction with the DEXA conferences in Zaragoza. It was our goal that this event would be a forum to bring together researchers from academia and commercial developers from industry to discuss the state of the art of technology for establishing trust, privacy, and security in digital business. We thank the attendees for coming to Copenhagen to participate and debate the new emerging advances in this area. The workshop program consisted of one invited talk and 11 regular technical paper sessions. The invited talk and keynote speech was delivered by Hannes Federrath from the Chair for Management of Information Security at the University of Regensburg, Germany, on “Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. The regular paper sessions covered a broad range of topics, from access control issues to electronic auctioning, from trust and protocols to smart cards. The conference attracted over 100 submissions of which the Program Committee accepted 32 papers for presentation and inclusion in the conference proceedings. The authors of the accepted papers come from 16 different countries. The proceedings contain the revised versions of all accepted papers.
Computer security --- Public key infrastructure (Computer security) --- Data transmission systems --- Electronic commerce --- Business enterprises --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Data communication systems --- Transmission of data --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Security measures --- Computer networks --- Sécurité informatique --- Infrastructure à clé publique (Sécurité informatique) --- Données --- Commerce électronique --- Entreprises --- Congresses --- Congrès --- Transmissions --- Sécurité --- Mesures --- Réseaux d'ordinateurs --- EPUB-LIV-FT SPRINGER-B --- Computer security - Congresses --- Public key infrastructure (Computer security) - Congresses --- Data transmission systems - Security measures - Congresses --- Electronic commerce - Security measures - Congresses --- Business enterprises - Computer networks - Security measures - Congresses --- Congresses.
Choose an application
The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures which for example support Internet security by authenticating software downloads and updates. Although PKC does not require the confidential exchange of secret keys, proper management of the private and public keys used in PKC is still of vital importance: the private keys must remain private, and the public keys must be verifiably authentic. So understanding so-called public key infrastructures (PKIs) that manage key pairs is at least as important as studying the ingenious mathematical ideas underlying PKC. In this book the authors explain the most important concepts underlying PKIs and discuss relevant standards, implementations, and applications. The book is structured into chapters on the motivation for PKI, certificates, trust models, private keys, revocation, validity models, certification service providers, certificate policies, certification paths, and practical aspects of PKI. This is a suitable textbook for advanced undergraduate and graduate courses in computer science, mathematics, engineering, and related disciplines, complementing introductory courses on cryptography. The authors assume only basic computer science prerequisites, and they include exercises in all chapters and solutions in an appendix. They also include detailed pointers to relevant standards and implementation guidelines, so the book is also appropriate for self-study and reference by industrial and academic researchers and practitioners.
Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer security. --- Data structures (Computer science). --- E-commerce. --- System safety. --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Systems and Data Security. --- e-Commerce/e-business. --- Security Science and Technology. --- Data structures (Computer science) --- Public key infrastructure (Computer security) --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer security --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Safety, System --- Safety of systems --- Systems safety --- Accidents --- Industrial safety --- Systems engineering --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Prevention
Listing 1 - 10 of 29 | << page >> |
Sort by
|