Rethinking Public Key Infrastructures and Digital Certificates

Rethinking Public Key Infrastructures and Digital Certificates
Author :
Publisher : MIT Press
Total Pages : 348
Release :
ISBN-10 : 0262261669
ISBN-13 : 9780262261661
Rating : 4/5 (69 Downloads)

Book Synopsis Rethinking Public Key Infrastructures and Digital Certificates by : Stefan Brands

Download or read book Rethinking Public Key Infrastructures and Digital Certificates written by Stefan Brands and published by MIT Press. This book was released on 2000-08-30 with total page 348 pages. Available in PDF, EPUB and Kindle. Book excerpt: Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts believe that digital certificates offer the best technology for safeguarding electronic communications. They are already widely used for authenticating and encrypting email and software, and eventually will be built into any device or piece of software that must be able to communicate securely. There is a serious problem, however, with this unavoidable trend: unless drastic measures are taken, everyone will be forced to communicate via what will be the most pervasive electronic surveillance tool ever built. There will also be abundant opportunity for misuse of digital certificates by hackers, unscrupulous employees, government agencies, financial institutions, insurance companies, and so on.In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens: anyone can establish their validity and the data they specify, but no more than that. Furthermore, different actions by the same person cannot be linked. Certificate holders have control over what information is disclosed, and to whom. Subsets of the proposed cryptographic building blocks can be used in combination, allowing a cookbook approach to the design of public key infrastructures. Potential applications include electronic cash, electronic postage, digital rights management, pseudonyms for online chat rooms, health care information storage, electronic voting, and even electronic gambling.

Rethinking Public Key Infrastructures and Digital Certificates

Rethinking Public Key Infrastructures and Digital Certificates
Author :
Publisher : Mit Press
Total Pages : 314
Release :
ISBN-10 : 0262024918
ISBN-13 : 9780262024914
Rating : 4/5 (18 Downloads)

Book Synopsis Rethinking Public Key Infrastructures and Digital Certificates by : Stefan A. Brands

Download or read book Rethinking Public Key Infrastructures and Digital Certificates written by Stefan A. Brands and published by Mit Press. This book was released on 2000 with total page 314 pages. Available in PDF, EPUB and Kindle. Book excerpt: Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security.

Public Key Infrastructure

Public Key Infrastructure
Author :
Publisher : Springer
Total Pages : 392
Release :
ISBN-10 : 9783540259800
ISBN-13 : 3540259805
Rating : 4/5 (00 Downloads)

Book Synopsis Public Key Infrastructure by : Sokratis K. Katsikas

Download or read book Public Key Infrastructure written by Sokratis K. Katsikas and published by Springer. This book was released on 2004-06-25 with total page 392 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the refereed proceedings of the First European Public Key Infrastructure Workshop: Research and Applications, EuroPKI 2004, held on Samos Island, Greece in June 2004. The 25 revised full papers and 5 revised short papers presented were carefully reviewed and selected from 73 submissions. The papers address all current issues in PKI, ranging from theoretical and foundational topics to applications and regulatory issues in various contexts.

Cryptology and Network Security

Cryptology and Network Security
Author :
Publisher : Springer
Total Pages : 286
Release :
ISBN-10 : 9783540769699
ISBN-13 : 3540769692
Rating : 4/5 (99 Downloads)

Book Synopsis Cryptology and Network Security by : Feng Bao

Download or read book Cryptology and Network Security written by Feng Bao and published by Springer. This book was released on 2007-11-15 with total page 286 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network Security, CANS 2007, held in Singapore, in December 2007. The 17 revised full papers presented were carefully reviewed and selected. The papers are organized in topical sections on signatures, network security, secure keyword search and private information retrieval, public key encryption, intrusion detection, email security, denial of service attacks, and authentication.

Handbook of Database Security

Handbook of Database Security
Author :
Publisher : Springer Science & Business Media
Total Pages : 579
Release :
ISBN-10 : 9780387485331
ISBN-13 : 0387485333
Rating : 4/5 (31 Downloads)

Book Synopsis Handbook of Database Security by : Michael Gertz

Download or read book Handbook of Database Security written by Michael Gertz and published by Springer Science & Business Media. This book was released on 2007-12-03 with total page 579 pages. Available in PDF, EPUB and Kindle. Book excerpt: Handbook of Database Security: Applications and Trends provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings. In addition to providing an overview of data security in different application settings, this book includes an outline for future research directions within the field. The book is designed for industry practitioners and researchers, and is also suitable for advanced-level students in computer science.

Applied Cryptography and Network Security

Applied Cryptography and Network Security
Author :
Publisher : Springer
Total Pages : 540
Release :
ISBN-10 : 9783540315421
ISBN-13 : 354031542X
Rating : 4/5 (21 Downloads)

Book Synopsis Applied Cryptography and Network Security by : John Ioannidis

Download or read book Applied Cryptography and Network Security written by John Ioannidis and published by Springer. This book was released on 2005-05-20 with total page 540 pages. Available in PDF, EPUB and Kindle. Book excerpt: The 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ICISA (the International Commu- cations and Information Security Association). It was held at Columbia University in New York, USA, June 7–10, 2005. This conference proceedings volume contains papers presented in the academic/research track. ACNS covers a large number of research areas that have been gaining importance in recent years due to the development of the Internet, wireless communication and the increased global exposure of computing resources. The papers in this volume are representative of the state of the art in security and cryptography research, worldwide. The Program Committee of the conference received a total of 158 submissions from all over the world, of which 35 submissions were selected for presentation at the a- demic track. In addition to this track, the conference also hosted a technical/ industrial/ short papers track whose presentations were also carefully selected from among the submissions. All submissions were reviewed by experts in the relevant areas.

Burdens of Proof

Burdens of Proof
Author :
Publisher : MIT Press
Total Pages : 283
Release :
ISBN-10 : 9780262300803
ISBN-13 : 026230080X
Rating : 4/5 (03 Downloads)

Book Synopsis Burdens of Proof by : Jean-Francois Blanchette

Download or read book Burdens of Proof written by Jean-Francois Blanchette and published by MIT Press. This book was released on 2012-04-27 with total page 283 pages. Available in PDF, EPUB and Kindle. Book excerpt: An examination of the challenges of establishing the authenticity of electronic documents—in particular the design of a cryptographic equivalent to handwritten signatures. The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized at some point of their life cycle, easily copied, altered, and distributed. In Burdens of Proof, Jean-François Blanchette examines the challenge of defining a new evidentiary framework for electronic documents, focusing on the design of a digital equivalent to handwritten signatures. From the blackboards of mathematicians to the halls of legislative assemblies, Blanchette traces the path of such an equivalent: digital signatures based on the mathematics of public-key cryptography. In the mid-1990s, cryptographic signatures formed the centerpiece of a worldwide wave of legal reform and of an ambitious cryptographic research agenda that sought to build privacy, anonymity, and accountability into the very infrastructure of the Internet. Yet markets for cryptographic products collapsed in the aftermath of the dot-com boom and bust along with cryptography's social projects. Blanchette describes the trials of French bureaucracies as they wrestled with the application of electronic signatures to real estate contracts, birth certificates, and land titles, and tracks the convoluted paths through which electronic documents acquire moral authority. These paths suggest that the material world need not merely succumb to the virtual but, rather, can usefully inspire it. Indeed, Blanchette argues, in renewing their engagement with the material world, cryptographers might also find the key to broader acceptance of their design goals.