First, however, we must start with some basic definitions and assumptions to sketch our frame of reference. It is assumed that most readers will already know what a PKI is, and how public-key cryptography works. Therefore I will only provide a brief overview of those details.
Public Key Infrastructure: Research and Applications
β Scribed by Stefanos Gritzalis
- Publisher
- Springer-Verlag
- Year
- 2005
- Tongue
- English
- Weight
- 101 KB
- Volume
- 5
- Category
- Article
- ISSN
- 1615-5262
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
This paper describes a security middleware for enhancing the interoperability of public key infrastructure (PKI). Security is a key concern in e-commerce and is especially critical in cross-enterprise transactions. Public key cryptography is widely accepted as an important mechanism for addressing t
In this paper, we propose a novel radio frequency identification (RFID) infrastructure enabling multi-purpose RFID tags realized by the use of privacy preserving public key cryptography (PKC) architecture. The infrastructure ensures that the access rights of the tags are preserved based on the spati
Before the promise of electronic commerce will be realized, there must first be sufficient infrastructure in place to enable the deployment of useful, secure, electronic commerce applications. Today, many companies are struggling with the complex technological and operational issues, which must be