Related Books
Language: en
Pages: 276
Pages: 276
Type: BOOK - Published: 2005 - Publisher: IOS Press
Includes topics such as: Public Key Infrastructure (PKI) Operation and Case Study, Non-repudiation, Authorization and Access Control, Authentication and Time-St
Language: en
Pages: 360
Pages: 360
Type: BOOK - Published: 2003 - Publisher: Addison-Wesley Professional
PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic se
Language: en
Pages: 390
Pages: 390
Type: BOOK - Published: 1996-09-16 - Publisher: Springer Science & Business Media
This book constitutes the refereed proceedings of the 4th European Symposium on Research in Computer Security, ESORICS '96, held in Rome, Italy, in September 19
Language: en
Pages: 206
Pages: 206
Type: BOOK - Published: 2013-11-19 - Publisher: Springer Science & Business Media
The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential comm
Language: en
Pages: 528
Pages: 528
Type: BOOK - Published: 2014 - Publisher: Feisty Duck
Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of