Amazon cover image
Image from Amazon.com

Applied public key infrastructure : 4th International Workshop : IWAP 2005 / edited by Jianying Zhou [and others].

By: Contributor(s): Material type: TextTextSeries: Frontiers in artificial intelligence and applications ; v. 128.Publication details: Amsterdam ; Washington, DC : IOS Press, ©2005.Description: 1 online resource (x, 265 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 1423799690
  • 9781423799696
  • 9781607501367
  • 1607501368
  • 6610505004
  • 1280505001
  • 9781280505003
  • 9786610505005
  • 6000003455
  • 9786000003456
  • 1601291175
  • 9781601291172
Other title:
  • IWAP 2005
Subject(s): Genre/Form: Additional physical formats: Print version:: Applied public key infrastructure.DDC classification:
  • 005.8/2 22
LOC classification:
  • QA76.9.A25 I558 2005eb
Online resources:
Contents:
Title page; Preface; Program Committee; Contents; PKI Operation & Case Study; Non-Repudiation; Authorization & Access Control; Authentication & Time-Stamping; Certificate Validation & Revocation; Cryptographic Applications; Author Index.
Action note:
  • digitized 2010 HathiTrust Digital Library committed to preserve
Summary: Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related operations through the sharing of case studies are critical to supporting the continued research and development of PKI technologies and related systems and appliations to further progress and innovate for enhancing future development and evolution of PKI in the enterprises. This publication includes topics such as: PKI Operation & Case Study; Non-repudiation; Authorization & Access Control, Authentication & Time-tamping, Certificate Validation & Revocation and Cryptographic Applications.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library EBSCO Computers Available
Total holds: 0

Includes bibliographical references and author index.

Title page; Preface; Program Committee; Contents; PKI Operation & Case Study; Non-Repudiation; Authorization & Access Control; Authentication & Time-Stamping; Certificate Validation & Revocation; Cryptographic Applications; Author Index.

Print version record.

Use copy Restrictions unspecified star MiAaHDL

Electronic reproduction. [Place of publication not identified] : HathiTrust Digital Library, 2010. MiAaHDL

Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. MiAaHDL

http://purl.oclc.org/DLF/benchrepro0212

digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL

Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related operations through the sharing of case studies are critical to supporting the continued research and development of PKI technologies and related systems and appliations to further progress and innovate for enhancing future development and evolution of PKI in the enterprises. This publication includes topics such as: PKI Operation & Case Study; Non-repudiation; Authorization & Access Control, Authentication & Time-tamping, Certificate Validation & Revocation and Cryptographic Applications.

English.

Added to collection customer.56279.3

Powered by Koha