Understanding PKI concepts, standards, and deployment considerations
Saved in:
Main Author: | Adams, Carlisle 1961- |
---|---|
Other Authors: | Lloyd, Steve |
Format: | Book |
Published: |
Boston
Addison-Wesley
2003
|
Edition: | 2nd ed |
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
PKI security solutions for the enterprise solving HIPPA, E-paper act, and other compliance issues
by: Raina, Kapil
Published: (2003) -
Introduction to identity-based encryption
by: Martin, Luther
Published: (2008) -
PKI implementing and managing e-security
Published: (2001) -
Beginning cryptography with Java
by: Hook, David 1962-
Published: (2005) -
Protocols for authentication and key establishment
by: Boyd, Colin
Published: (2003)