Rethinking Public Key Infrastructures and Digital Certificates
by Stefan A. Brands
Publisher: The MIT Press 2000
ISBN/ASIN: 0262024918
ISBN-13: 9780262024914
Number of pages: 356
Description:
In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens: anyone can establish their validity and the data they specify, but no more than that.
Download or read it online for free here:
Download link
(multiple PDF files)
Similar books
The Antivirus Defense-in-Depth Guide
- Microsoft Corporation
The Antivirus Defense-in-Depth Guide provides an overview of the types of malware and their risks, planning an effective antivirus strategy for your organization, and responding quickly and effectively to infections or incidents when they occur.
(15165 views)
- Microsoft Corporation
The Antivirus Defense-in-Depth Guide provides an overview of the types of malware and their risks, planning an effective antivirus strategy for your organization, and responding quickly and effectively to infections or incidents when they occur.
(15165 views)
A Guide to Claims-Based Identity and Access Control
by Dominick Baier, at al. - Microsoft Press
This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or IT professional.
(13038 views)
by Dominick Baier, at al. - Microsoft Press
This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or IT professional.
(13038 views)
The Developer Highway Code
by Paul Maher, Alex Mackman - Microsoft Press
This handbook summarises the principal security activities which should be a part of software development processes. It includes identifying security objectives, threat modelling, security design guidelines, security architecture reviews, and more.
(19520 views)
by Paul Maher, Alex Mackman - Microsoft Press
This handbook summarises the principal security activities which should be a part of software development processes. It includes identifying security objectives, threat modelling, security design guidelines, security architecture reviews, and more.
(19520 views)
Provable Security of Networks
by Angsheng Li, Yicheng Pan, Wei Zhang - arXiv
We propose a definition of security and a definition of robustness of networks against the cascading failure models of deliberate attacks and random errors respectively, and investigate the principles of the security and robustness of networks.
(9679 views)
by Angsheng Li, Yicheng Pan, Wei Zhang - arXiv
We propose a definition of security and a definition of robustness of networks against the cascading failure models of deliberate attacks and random errors respectively, and investigate the principles of the security and robustness of networks.
(9679 views)