A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI
ISC '02 Proceedings of the 5th International Conference on Information Security
A public-key based authentication and key establishment protocol coupled with a client puzzle
Journal of the American Society for Information Science and Technology
Performance evaluation of public key-based authentication in future mobile communication systems
EURASIP Journal on Wireless Communications and Networking - Special issue on innovative signal transmission and detection techniques for next generation cellular CDMA systems
A proposed curriculum of cryptography courses
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
PKI-based secure mobile access to electronic health services and data
Technology and Health Care
Support of subscribers' certificates in a hybrid WLAN-3G environment
Computer Networks: The International Journal of Computer and Telecommunications Networking
On the deployment of a real scalable delegation service
Information Security Tech. Report
Strategic planning for the computer science security
WSEAS Transactions on Computers
A secure multiple-agent cryptographic key recovery system
IRI'09 Proceedings of the 10th IEEE international conference on Information Reuse & Integration
A secure e-Government platform architecture for small to medium sized public organizations
Electronic Commerce Research and Applications
An investment content delivery secure e-service
TELE-INFO'06 Proceedings of the 5th WSEAS international conference on Telecommunications and informatics
An efficient scheme of merging multiple public key infrastructures in ERP
WAIM'05 Proceedings of the 6th international conference on Advances in Web-Age Information Management
A practical scheme of merging multiple public key infrastructures in e-commerce
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Installing fake root keys in a PC
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Hi-index | 0.00 |
From the Publisher:Written by the experts at RSA Security,this book will show you how to secure transactions and develop customer trust in e-commerce through the use of PKI technology. Part of the RSA Press Series. Implement PKI technology and enable secure Web transactions Conduct online business safely by following the implementation techniques found inside this essential guide to PKI technology. Written by the experts at RSA security,this book provides comprehensive coverage of this emerging technology that uses digital certificates to secure Internet transactions. Beginning with an introduction to cryptography,this book explains the technology that creates a public-key infrastructure,and outlines the necessary steps for implementing PKI in both business-to-business and business-to-consumer environments. Also included is material on WAP,authorization systems,and cost of ownership,making this the most in-depth reference on PKI available. This book will show you how to:Understand basic principles of cryptographic systemsLearn how a public key infrastructure supplies security services for electronic commerce deploymentsGet details on applicable standards ITU-X. 500,IETF-PKIX,and WAPApply certificates for authentication,time stamping,and non-repudiationManage key and certificate life cycles within a public key infrastructureManage the PKIX architecture and the PKI protocols that allow interoperability between different vendor implementationsUnderstand how trust models can be used to establish relationships between organizations Follow case studies to solve common problems encountered when implementing PKI