Lancaster et al., 2003 - Google Patents
Public key infrastructure: a micro and macro analysisLancaster et al., 2003
View PDF- Document ID
- 16478209494585291469
- Author
- Lancaster S
- Yen D
- Huang S
- Publication year
- Publication venue
- Computer Standards & Interfaces
External Links
Snippet
The Internet has increasingly been used for communication between people. Most users have no problem relaying messages, which do not contain confidential information, over a network. Yet, for it to be accepted as a medium of conducting monetary transactions there …
- 238000004458 analytical method 0 title description 5
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chokhani et al. | Internet X. 509 public key infrastructure certificate policy and certification practices framework | |
JP2003531447A5 (en) | ||
Sengupta et al. | e-Commerce security—A life cycle approach | |
Wilson | Certificates and trust in electronic commerce | |
Ambhire et al. | Information security in banking and financial industry | |
Lancaster et al. | Public key infrastructure: a micro and macro analysis | |
Smith | Control and Security of E-commerce | |
Kuechler et al. | Digital Signatures: A Business View. | |
WO2001035253A1 (en) | Legal-based or fiduciary-based data management process | |
Hazari | Challenges of implementing public key infrastructure in Netcentric enterprises | |
Shih et al. | Building e-enterprise security: A business view | |
Raymond Choo | Issue report on business adoption of Microsoft Passport | |
Yang et al. | A non-repudiation message transfer protocol for e-commerce | |
Gripman | Electronic document certification: A primer on the technology behind digital signatures | |
Zhang et al. | Controlling information risk in E-commerce | |
Billah | Islamic Fin-Tech: Digital Financial Products | |
Khandare et al. | A Global Overview of Data Security, Safety, Corporate Data Privacy, and Data Protection | |
KACHHIA | CHAPTER–17 E-COMMERCE SECURITY–A LIFE CYCLE APPROACH | |
Evans et al. | Private key infrastructure: balancing computer transmission privacy with changing technology and security demands | |
Braga | Fostering e-government in Brazil: a case study of digital certification adoption | |
Minihan | Electronic signature technologies: a tutorial.(Cover Story) | |
Ohashi | Multiparty Selective Disclosure using Attribute-Based Encryption | |
Antón et al. | Trustmarks and Privacy | |
Wells | Electronic and digital signatures: in search of a standard | |
Kefallinos et al. | Secure PKI-enabled e-government infrastructures implementation: the SYZEFXIS-PKI case |