- Introduction to Cryptography with Maple (eBook, PDF)48,95 €
- Provable Security (eBook, PDF)52,95 €
- Post-Quantum Cryptography (eBook, PDF)44,95 €
- Public-Key Cryptography -- PKC 2013 (eBook, PDF)56,95 €
- Information Security Technology for Applications (eBook, PDF)40,95 €
- CryptoSchool (eBook, PDF)28,95 €
- Information Theoretic Security (eBook, PDF)51,95 €
In this book the authors explain the most important concepts underlying PKIs and discuss relevant standards, implementations, and applications. The book is structured into chapters on the motivation for PKI, certificates, trust models, private keys, revocation, validity models, certification service providers, certificate policies, certification paths, and practical aspects of PKI.
This is a suitable textbook for advanced undergraduate and graduate courses in computer science, mathematics, engineering, and related disciplines, complementing introductory courses on cryptography. The authors assume only basic computer science prerequisites, and they include exercises in all chapters and solutions in an appendix. They also include detailed pointers to relevant standards and implementation guidelines, so the book is also appropriate for self-study and reference by industrial and academic researchers and practitioners.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Verlag: Springer-Verlag GmbH
- Seitenzahl: 194
- Erscheinungstermin: 19. November 2013
- ISBN-13: 9783642406577
- Artikelnr.: 44133019
Chap. 2 Certificates.
Chap. 3 Trust Models.
Chap. 4 Private Keys.
Chap. 5 Revocation.
Chap. 6 Validity Models.
Chap. 7 Certification Service Provider.
Chap. 8 Certificate Policies.
Chap. 9 Certification Paths: Retrieval and Validation.
Chap. 10 PKI in Practice.
App. A A Basic Path Validation Algorithm.
App. B Exercise Solutions.
"The layout and chapter exercises make the book suitable for use as a course textbook. ... The authors explain the complex workings of public-key cryptography and the infrastructure necessary to support it. The chapters are well illustrated with diagrams and figures. It is not necessary to understand how PKI works to securely use the Internet, but if you do want to understand the minutia of PKI then this book will help." (David B. Henderson, Computing Reviews, March, 2014)