• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Applied public key infrastructure :

پدید آورنده
edited by Jianying Zhou [and others].

موضوع
Public key cryptography, Congresses.,Public key infrastructure (Computer security), Congresses.,COMPUTERS-- Security-- Cryptography.,Public key cryptography.,Public key infrastructure (Computer security)

رده
QA76
.
9
.
A25
I558
2005eb

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
1280505001
(Number (ISBN
1423799690
(Number (ISBN
1601291175
(Number (ISBN
1607501368
(Number (ISBN
6000003455
(Number (ISBN
6610505004
(Number (ISBN
9781280505003
(Number (ISBN
9781423799696
(Number (ISBN
9781601291172
(Number (ISBN
9781607501367
(Number (ISBN
9786000003456
(Number (ISBN
9786610505005
Erroneous ISBN
1586035509
Erroneous ISBN
9781586035501

NATIONAL BIBLIOGRAPHY NUMBER

Number
b709920

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Applied public key infrastructure :
General Material Designation
[Book]
Other Title Information
4th International Workshop : IWAP 2005 /
First Statement of Responsibility
edited by Jianying Zhou [and others].

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Washington, DC :
Name of Publisher, Distributor, etc.
IOS Press,
Date of Publication, Distribution, etc.
©2005.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (x, 265 pages) :
Other Physical Details
illustrations.

SERIES

Series Title
Frontiers in artificial intelligence and applications ;
Volume Designation
v. 128

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references and author index.

CONTENTS NOTE

Text of Note
Title page; Preface; Program Committee; Contents; PKI Operation & Case Study; Non-Repudiation; Authorization & Access Control; Authentication & Time-Stamping; Certificate Validation & Revocation; Cryptographic Applications; Author Index.
0

SUMMARY OR ABSTRACT

Text of Note
Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related operations through the sharing of case studies are critical to supporting the continued research and development of PKI technologies and related systems and appliations to further progress and innovate for enhancing future development and evolution of PKI in the enterprises. This publication includes topics such as: PKI Operation & Case Study; Non-repudiation; Authorization & Access Control, Authentication & Time-tamping, Certificate Validation & Revocation and Cryptographic Applications.

SYSTEM REQUIREMENTS NOTE (ELECTRONIC RESOURCES)

Text of Note
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
IOS Press
Stock Number
978-1-58603-550-1

OTHER EDITION IN ANOTHER MEDIUM

Title
Applied public key infrastructure.

PARALLEL TITLE PROPER

Parallel Title
IWAP 2005

TOPICAL NAME USED AS SUBJECT

Public key cryptography, Congresses.
Public key infrastructure (Computer security), Congresses.
COMPUTERS-- Security-- Cryptography.
Public key cryptography.
Public key infrastructure (Computer security)

(SUBJECT CATEGORY (Provisional

COM-- COM004000
K

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8/2
Edition
22

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
9
.
A25
Book number
I558
2005eb

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Zhou, Jianying.

CORPORATE BODY NAME - PRIMARY RESPONSIBILITY

International Workshop for Applied PKI(4th :2005 :, Singapore)

ORIGINATING SOURCE

Date of Transaction
20201208004352.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival