Rethinking Public Key Infrastructures and Digital Certificates
by Stefan A. Brands
Publisher: The MIT Press 2000
Number of pages: 356
In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens: anyone can establish their validity and the data they specify, but no more than that.
Home page url
Download or read it online for free here:
(multiple PDF files)
- The National Academies Press
Software update is an important mechanism by which security changes and improvements are made in software, and this seemingly simple concept encompasses a wide variety of practices, mechanisms, policies, and technologies.
by N. Richard Wagner - Univ. of Texas San Antonio
Indeed, what if crime were impossible? This book explores technological possibilities for society, including controversial techniques like computer surveillance and tracking, and sophisticated identification of individuals.
by Christos Kalloniatis - InTech
Designing and implementing security enhanced systems is of vital importance. This book aims to present a number of innovative security enhanced applications. It involves cases based on the standalone, network and Cloud environments.
by Kyriacos E. Pavlou, Richard T. Snodgrass - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.