Logo

Rethinking Public Key Infrastructures and Digital Certificates

Large book cover: Rethinking Public Key Infrastructures and Digital Certificates

Rethinking Public Key Infrastructures and Digital Certificates
by

Publisher: The MIT Press
ISBN/ASIN: 0262024918
ISBN-13: 9780262024914
Number of pages: 356

Description:
In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens: anyone can establish their validity and the data they specify, but no more than that.

Home page url

Download or read it online for free here:
Download link
(multiple PDF files)

Similar books

Book cover: The Antivirus Defense-in-Depth GuideThe Antivirus Defense-in-Depth Guide
- Microsoft Corporation
The Antivirus Defense-in-Depth Guide provides an overview of the types of malware and their risks, planning an effective antivirus strategy for your organization, and responding quickly and effectively to infections or incidents when they occur.
(15165 views)
Book cover: A Guide to Claims-Based Identity and Access ControlA Guide to Claims-Based Identity and Access Control
by - Microsoft Press
This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or IT professional.
(13038 views)
Book cover: The Developer Highway CodeThe Developer Highway Code
by - Microsoft Press
This handbook summarises the principal security activities which should be a part of software development processes. It includes identifying security objectives, threat modelling, security design guidelines, security architecture reviews, and more.
(19520 views)
Book cover: Provable Security of NetworksProvable Security of Networks
by - arXiv
We propose a definition of security and a definition of robustness of networks against the cascading failure models of deliberate attacks and random errors respectively, and investigate the principles of the security and robustness of networks.
(9679 views)