[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Lancaster et al., 2003 - Google Patents

Public key infrastructure: a micro and macro analysis

Lancaster et al., 2003

View PDF
Document ID
16478209494585291469
Author
Lancaster S
Yen D
Huang S
Publication year
Publication venue
Computer Standards & Interfaces

External Links

Snippet

The Internet has increasingly been used for communication between people. Most users have no problem relaying messages, which do not contain confidential information, over a network. Yet, for it to be accepted as a medium of conducting monetary transactions there …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Similar Documents

Publication Publication Date Title
Chokhani et al. Internet X. 509 public key infrastructure certificate policy and certification practices framework
JP2003531447A5 (en)
Sengupta et al. e-Commerce security—A life cycle approach
Wilson Certificates and trust in electronic commerce
Ambhire et al. Information security in banking and financial industry
Lancaster et al. Public key infrastructure: a micro and macro analysis
Smith Control and Security of E-commerce
Kuechler et al. Digital Signatures: A Business View.
WO2001035253A1 (en) Legal-based or fiduciary-based data management process
Hazari Challenges of implementing public key infrastructure in Netcentric enterprises
Shih et al. Building e-enterprise security: A business view
Raymond Choo Issue report on business adoption of Microsoft Passport
Yang et al. A non-repudiation message transfer protocol for e-commerce
Gripman Electronic document certification: A primer on the technology behind digital signatures
Zhang et al. Controlling information risk in E-commerce
Billah Islamic Fin-Tech: Digital Financial Products
Khandare et al. A Global Overview of Data Security, Safety, Corporate Data Privacy, and Data Protection
KACHHIA CHAPTER–17 E-COMMERCE SECURITY–A LIFE CYCLE APPROACH
Evans et al. Private key infrastructure: balancing computer transmission privacy with changing technology and security demands
Braga Fostering e-government in Brazil: a case study of digital certification adoption
Minihan Electronic signature technologies: a tutorial.(Cover Story)
Ohashi Multiparty Selective Disclosure using Attribute-Based Encryption
Antón et al. Trustmarks and Privacy
Wells Electronic and digital signatures: in search of a standard
Kefallinos et al. Secure PKI-enabled e-government infrastructures implementation: the SYZEFXIS-PKI case