Free Shipping When You Reach $50
Menu
Applied Public Key Infrastructure: 4th International Workshop on AI & Security - Cryptography, Digital Signatures & Network Protection for E-commerce & Cybersecurity
Applied Public Key Infrastructure: 4th International Workshop on AI & Security - Cryptography, Digital Signatures & Network Protection for E-commerce & Cybersecurity

Applied Public Key Infrastructure: 4th International Workshop on AI & Security - Cryptography, Digital Signatures & Network Protection for E-commerce & Cybersecurity

$44.39 $80.71 -45% OFF

Free shipping on all orders over $50

7-15 days international

23 people viewing this product right now!

30-day free returns

Secure checkout

67586582

Guranteed safe checkout
amex
paypal
discover
mastercard
visa
apple pay

Description

Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related operations through the sharing of case studies are critical to supporting the continued research and development of PKI technologies and related systems and applications to further progress and innovate for enhancing future development and evolution of PKI in the enterprises. This publication includes topics such as: PKI Operation & Case Study, Non-repudiation, Authorization & Access Control, Authentication & Time-Stamping, Certificate Validation & Revocation, and Cryptographic Applications.IOS Press is an international science, technical and medical publisher of high-quality books for academics, scientists, and professionals in all fields. Some of the areas we publish in: -Biomedicine -Oncology -Artificial intelligence -Databases and information systems -Maritime engineering -Nanotechnology -Geoengineering -All aspects of physics -E-governance -E-commerce -The knowledge economy -Urban studies -Arms control -Understanding and responding to terrorism -Medical informatics -Computer Sciences

We value your privacy

We use cookies and other technologies to personalize your experience, perform marketing, and collect analytics. Learn more in our Privacy Policy.

Top