Secure communications between bandwidth brokers
ACM SIGOPS Operating Systems Review
Information security education in the UK: a proposed course in secure e-commerce systems
Proceedings of the 1st annual conference on Information security curriculum development
Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks
Computer Communications
Web application security in a crossing boundaries grid system
EATIS '07 Proceedings of the 2007 Euro American conference on Telematics and information systems
Optimized Certificates --- A New Proposal for Efficient Electronic Document Signature Validation
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
A Proof of Concept Attack against Norwegian Internet Banking Systems
Financial Cryptography and Data Security
Graduate follow up as a vehicle for CSIT curriculum assessment and improvement
Proceedings of the 14th Western Canadian Conference on Computing Education
An Efficient and Flexible Scheme to Support Biometric-Based and Role-Based Access Control
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Secured access to RT database in biotelemetric system
COMPUCHEM'08 Proceedings of the 2nd WSEAS international conference on Computational chemistry
Towards a trustworthy short-range mobile payment system
International Journal of Information Technology and Management
A novel algorithm to prevent man in the middle attack in LAN environment
SpringSim '10 Proceedings of the 2010 Spring Simulation Multiconference
Reducing the cost of certificate revocation: a case study
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
Reclaiming the blogosphere, talkback: a secure linkback protocol for weblogs
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
A collaborative reputation-based vetting model for online certification of businesses
Proceedings of the Second Kuwait Conference on e-Services and e-Systems
Foisting and stealing of keys in sensor networks
EWSN'12 Proceedings of the 9th European conference on Wireless Sensor Networks
A universal client-based identity management tool
EuroPKI'11 Proceedings of the 8th European conference on Public Key Infrastructures, Services, and Applications
SDAI: An integral evaluation methodology for content-based spam filtering models
Expert Systems with Applications: An International Journal
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
Speculations on the science of web user security
Computer Networks: The International Journal of Computer and Telecommunications Networking
The Charité Grid Portal: User-friendly and Secure Access to Grid-based Resources and Services
Journal of Grid Computing
A snapshot of trusted personal devices applicable to transaction processing
Personal and Ubiquitous Computing
Performance and Scalability Assessment for Non-Certificate-Based Public Key Management in VANETs
International Journal of Information Security and Privacy
Multi-domain public key infrastructure for information security with use of a multi-agent system
ACIIDS'13 Proceedings of the 5th Asian conference on Intelligent Information and Database Systems - Volume Part I
Hi-index | 0.00 |
PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which are used to authenticate a message sender. Because PKI is the standard for authenticating commercial electronic transactions, Understanding PKI, Second Edition, provides network and security architects with the tools they need to grasp each phase of the key/certificate life cycle, including generation, publication, deployment, and recovery.