Logo

Rethinking Public Key Infrastructures and Digital Certificates

Large book cover: Rethinking Public Key Infrastructures and Digital Certificates

Rethinking Public Key Infrastructures and Digital Certificates
by

Publisher: The MIT Press
ISBN/ASIN: 0262024918
ISBN-13: 9780262024914
Number of pages: 356

Description:
In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens: anyone can establish their validity and the data they specify, but no more than that.

Home page url

Download or read it online for free here:
Download link
(multiple PDF files)

Similar books

Book cover: Security ConceptsSecurity Concepts
by - subspacefield.org
This is an online book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting examples. It is not intended to be an introductory text, although a beginner could gain something from it.
(12063 views)
Book cover: Cryptography and Security in ComputingCryptography and Security in Computing
by - InTech
The purpose of this book is to present some of the security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defense mechanisms.
(20597 views)
Book cover: Security Engineering: A Guide to Building Dependable Distributed SystemsSecurity Engineering: A Guide to Building Dependable Distributed Systems
by - Wiley
The author lays the groundwork on how to build a secure and dependable system. Every security aspect is discussed: passwords, access control, attacks, physical security and policy, information warfare, privacy protection, and more.
(19103 views)
Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(18856 views)