Rethinking public key infrastructures and digital certificates :: building in privacy /
Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten si...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge, Mass. :
MIT Press,
©2000.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts believe that digital certificates offer the best technology for safeguarding electronic communications. They are already widely used for authenticating and encrypting email and software, and eventually will be built into any device or piece of software that must be able to communicate securely. There is a serious problem, however, with this unavoidable trend: unless drastic measures are taken, everyone will be forced to communicate via what will be the most pervasive electronic surveillance tool ever built. There will also be abundant opportunity for misuse of digital certificates by hackers, unscrupulous employees, government agencies, financial institutions, insurance companies, and so on. In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens: anyone can establish their validity and the data they specify, but no more than that. Furthermore, different actions by the same person cannot be linked. Certificate holders have control over what information is disclosed, and to whom. Subsets of the proposed cryptographic building blocks can be used in combination, allowing a cookbook approach to the design of public key infrastructures. Potential applications include electronic cash, electronic postage, digital rights management, pseudonyms for online chat rooms, health care information storage, electronic voting, and even electronic gambling. |
Beschreibung: | Title from title screen. Includes index. |
Beschreibung: | 1 online resource (xxi, 314 pages) |
Bibliographie: | Includes bibliographical references (pages 273-306) and index. |
ISBN: | 9780262269131 0262269139 9780262024914 0262024918 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn183263756 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr zn||||||||| | ||
008 | 010625s2000 maua ob 001 0 eng d | ||
040 | |a COO |b eng |e pn |c COO |d N$T |d OCLCQ |d VVN |d OCLCQ |d B24X7 |d OCLCQ |d OCLCF |d OCLCO |d YDXCP |d OCLCQ |d AGLDB |d LIV |d OCLCA |d VTS |d COO |d MITPR |d STF |d M8D |d EBLCP |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 47249378 |a 61678501 | ||
020 | |a 9780262269131 |q (electronic bk.) | ||
020 | |a 0262269139 |q (electronic bk.) | ||
020 | |a 9780262024914 | ||
020 | |a 0262024918 | ||
035 | |a (OCoLC)183263756 |z (OCoLC)47249378 |z (OCoLC)61678501 | ||
037 | |a 5931 |b MIT Press | ||
037 | |a 9780262269131 |b MIT Press | ||
050 | 4 | |a TK5105.59 |b .B73 2000b | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 21 | |
049 | |a MAIN | ||
100 | 1 | |a Brands, Stefan A. | |
245 | 1 | 0 | |a Rethinking public key infrastructures and digital certificates : |b building in privacy / |c Stefan A. Brands. |
246 | 1 | 6 | |a Rethinking public key infrastructure and digital certificates |
260 | |a Cambridge, Mass. : |b MIT Press, |c ©2000. | ||
300 | |a 1 online resource (xxi, 314 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
500 | |a Title from title screen. | ||
500 | |a Includes index. | ||
504 | |a Includes bibliographical references (pages 273-306) and index. | ||
520 | |a Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts believe that digital certificates offer the best technology for safeguarding electronic communications. They are already widely used for authenticating and encrypting email and software, and eventually will be built into any device or piece of software that must be able to communicate securely. There is a serious problem, however, with this unavoidable trend: unless drastic measures are taken, everyone will be forced to communicate via what will be the most pervasive electronic surveillance tool ever built. There will also be abundant opportunity for misuse of digital certificates by hackers, unscrupulous employees, government agencies, financial institutions, insurance companies, and so on. In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens: anyone can establish their validity and the data they specify, but no more than that. Furthermore, different actions by the same person cannot be linked. Certificate holders have control over what information is disclosed, and to whom. Subsets of the proposed cryptographic building blocks can be used in combination, allowing a cookbook approach to the design of public key infrastructures. Potential applications include electronic cash, electronic postage, digital rights management, pseudonyms for online chat rooms, health care information storage, electronic voting, and even electronic gambling. | ||
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Computer network protocols. |0 http://id.loc.gov/authorities/subjects/sh85029512 | |
650 | 0 | |a Data encryption (Computer science) |0 http://id.loc.gov/authorities/subjects/sh94001524 | |
650 | 0 | |a Computer security. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Protocoles de réseaux d'ordinateurs. | |
650 | 6 | |a Chiffrement (Informatique) | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer network protocols |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
653 | |a COMPUTER SCIENCE/General | ||
758 | |i has work: |a Rethinking public key infrastructures and digital certificates (Text) |1 https://id.oclc.org/worldcat/entity/E39PCH77gdbhkbxYhy7W4tfC73 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Brands, Stefan A. |t Rethinking public key infrastructures and digital certificates. |d Cambridge, Mass. : MIT Press, ©2000 |z 0262024918 |w (DLC) 00032866 |w (OCoLC)43945416 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=138599 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a Books 24x7 |b B247 |n bks00001220 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL5965991 | ||
938 | |a EBSCOhost |b EBSC |n 138599 | ||
938 | |a Internet Archive |b INAR |n rethinkingpublic0000bran | ||
938 | |a YBP Library Services |b YANK |n 2363566 | ||
938 | |a YBP Library Services |b YANK |n 3410910 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn183263756 |
---|---|
_version_ | 1816881658593280000 |
adam_text | |
any_adam_object | |
author | Brands, Stefan A. |
author_facet | Brands, Stefan A. |
author_role | |
author_sort | Brands, Stefan A. |
author_variant | s a b sa sab |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .B73 2000b |
callnumber-search | TK5105.59 .B73 2000b |
callnumber-sort | TK 45105.59 B73 42000B |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)183263756 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05271cam a2200745 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn183263756</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr zn|||||||||</controlfield><controlfield tag="008">010625s2000 maua ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">COO</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">COO</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VVN</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">B24X7</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCA</subfield><subfield code="d">VTS</subfield><subfield code="d">COO</subfield><subfield code="d">MITPR</subfield><subfield code="d">STF</subfield><subfield code="d">M8D</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">47249378</subfield><subfield code="a">61678501</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780262269131</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0262269139</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780262024914</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0262024918</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)183263756</subfield><subfield code="z">(OCoLC)47249378</subfield><subfield code="z">(OCoLC)61678501</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">5931</subfield><subfield code="b">MIT Press</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9780262269131</subfield><subfield code="b">MIT Press</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.B73 2000b</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Brands, Stefan A.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Rethinking public key infrastructures and digital certificates :</subfield><subfield code="b">building in privacy /</subfield><subfield code="c">Stefan A. Brands.</subfield></datafield><datafield tag="246" ind1="1" ind2="6"><subfield code="a">Rethinking public key infrastructure and digital certificates</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Cambridge, Mass. :</subfield><subfield code="b">MIT Press,</subfield><subfield code="c">©2000.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxi, 314 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from title screen.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 273-306) and index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts believe that digital certificates offer the best technology for safeguarding electronic communications. They are already widely used for authenticating and encrypting email and software, and eventually will be built into any device or piece of software that must be able to communicate securely. There is a serious problem, however, with this unavoidable trend: unless drastic measures are taken, everyone will be forced to communicate via what will be the most pervasive electronic surveillance tool ever built. There will also be abundant opportunity for misuse of digital certificates by hackers, unscrupulous employees, government agencies, financial institutions, insurance companies, and so on. In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens: anyone can establish their validity and the data they specify, but no more than that. Furthermore, different actions by the same person cannot be linked. Certificate holders have control over what information is disclosed, and to whom. Subsets of the proposed cryptographic building blocks can be used in combination, allowing a cookbook approach to the design of public key infrastructures. Potential applications include electronic cash, electronic postage, digital rights management, pseudonyms for online chat rooms, health care information storage, electronic voting, and even electronic gambling.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer network protocols.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85029512</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001524</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protocoles de réseaux d'ordinateurs.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer network protocols</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">COMPUTER SCIENCE/General</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Rethinking public key infrastructures and digital certificates (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCH77gdbhkbxYhy7W4tfC73</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Brands, Stefan A.</subfield><subfield code="t">Rethinking public key infrastructures and digital certificates.</subfield><subfield code="d">Cambridge, Mass. : MIT Press, ©2000</subfield><subfield code="z">0262024918</subfield><subfield code="w">(DLC) 00032866</subfield><subfield code="w">(OCoLC)43945416</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=138599</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00001220</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL5965991</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">138599</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">rethinkingpublic0000bran</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2363566</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">3410910</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn183263756 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:13Z |
institution | BVB |
isbn | 9780262269131 0262269139 9780262024914 0262024918 |
language | English |
oclc_num | 183263756 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxi, 314 pages) |
psigel | ZDB-4-EBA |
publishDate | 2000 |
publishDateSearch | 2000 |
publishDateSort | 2000 |
publisher | MIT Press, |
record_format | marc |
spelling | Brands, Stefan A. Rethinking public key infrastructures and digital certificates : building in privacy / Stefan A. Brands. Rethinking public key infrastructure and digital certificates Cambridge, Mass. : MIT Press, ©2000. 1 online resource (xxi, 314 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Title from title screen. Includes index. Includes bibliographical references (pages 273-306) and index. Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts believe that digital certificates offer the best technology for safeguarding electronic communications. They are already widely used for authenticating and encrypting email and software, and eventually will be built into any device or piece of software that must be able to communicate securely. There is a serious problem, however, with this unavoidable trend: unless drastic measures are taken, everyone will be forced to communicate via what will be the most pervasive electronic surveillance tool ever built. There will also be abundant opportunity for misuse of digital certificates by hackers, unscrupulous employees, government agencies, financial institutions, insurance companies, and so on. In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens: anyone can establish their validity and the data they specify, but no more than that. Furthermore, different actions by the same person cannot be linked. Certificate holders have control over what information is disclosed, and to whom. Subsets of the proposed cryptographic building blocks can be used in combination, allowing a cookbook approach to the design of public key infrastructures. Potential applications include electronic cash, electronic postage, digital rights management, pseudonyms for online chat rooms, health care information storage, electronic voting, and even electronic gambling. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer network protocols. http://id.loc.gov/authorities/subjects/sh85029512 Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Computer security. Réseaux d'ordinateurs Sécurité Mesures. Protocoles de réseaux d'ordinateurs. Chiffrement (Informatique) Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer network protocols fast Computer networks Security measures fast Computer security fast Data encryption (Computer science) fast COMPUTER SCIENCE/General has work: Rethinking public key infrastructures and digital certificates (Text) https://id.oclc.org/worldcat/entity/E39PCH77gdbhkbxYhy7W4tfC73 https://id.oclc.org/worldcat/ontology/hasWork Print version: Brands, Stefan A. Rethinking public key infrastructures and digital certificates. Cambridge, Mass. : MIT Press, ©2000 0262024918 (DLC) 00032866 (OCoLC)43945416 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=138599 Volltext |
spellingShingle | Brands, Stefan A. Rethinking public key infrastructures and digital certificates : building in privacy / Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer network protocols. http://id.loc.gov/authorities/subjects/sh85029512 Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Computer security. Réseaux d'ordinateurs Sécurité Mesures. Protocoles de réseaux d'ordinateurs. Chiffrement (Informatique) Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer network protocols fast Computer networks Security measures fast Computer security fast Data encryption (Computer science) fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh85029512 http://id.loc.gov/authorities/subjects/sh94001524 |
title | Rethinking public key infrastructures and digital certificates : building in privacy / |
title_alt | Rethinking public key infrastructure and digital certificates |
title_auth | Rethinking public key infrastructures and digital certificates : building in privacy / |
title_exact_search | Rethinking public key infrastructures and digital certificates : building in privacy / |
title_full | Rethinking public key infrastructures and digital certificates : building in privacy / Stefan A. Brands. |
title_fullStr | Rethinking public key infrastructures and digital certificates : building in privacy / Stefan A. Brands. |
title_full_unstemmed | Rethinking public key infrastructures and digital certificates : building in privacy / Stefan A. Brands. |
title_short | Rethinking public key infrastructures and digital certificates : |
title_sort | rethinking public key infrastructures and digital certificates building in privacy |
title_sub | building in privacy / |
topic | Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer network protocols. http://id.loc.gov/authorities/subjects/sh85029512 Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Computer security. Réseaux d'ordinateurs Sécurité Mesures. Protocoles de réseaux d'ordinateurs. Chiffrement (Informatique) Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer network protocols fast Computer networks Security measures fast Computer security fast Data encryption (Computer science) fast |
topic_facet | Computer networks Security measures. Computer network protocols. Data encryption (Computer science) Computer security. Réseaux d'ordinateurs Sécurité Mesures. Protocoles de réseaux d'ordinateurs. Chiffrement (Informatique) Sécurité informatique. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer network protocols Computer networks Security measures Computer security |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=138599 |
work_keys_str_mv | AT brandsstefana rethinkingpublickeyinfrastructuresanddigitalcertificatesbuildinginprivacy AT brandsstefana rethinkingpublickeyinfrastructureanddigitalcertificates |