Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Introduction to public key infrastructures / (Record no. 419253)

000 -LEADER
fixed length control field 02148nam a22002655i 4500
001 - CONTROL NUMBER
control field 136157
003 - CONTROL NUMBER IDENTIFIER
control field ISI Library, Kolkata
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20150929144058.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 131105s2013 nyu 000 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783642406560 (hard cover : alk. paper)
040 ## - CATALOGING SOURCE
Original cataloging agency ISI Library
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
Item number B918
245 00 - TITLE STATEMENT
Title Introduction to public key infrastructures /
Statement of responsibility, etc [edited by] Johannes A. Buchmann, Evangelos Karatsiolis and Alexander Wiesmaier.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Berlin :
Name of publisher, distributor, etc Springer-Verlag,
Date of publication, distribution, etc 2013.
300 ## - PHYSICAL DESCRIPTION
Extent xv, 194 p. :
Other physical details illustrations ;
Dimensions 24 cm.
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. The Purpose of PKI --<br/>2. Certificates --<br/>3. Trust Models --<br/>4. Private Keys --<br/>5. Revocation --<br/>6. Validity Models --<br/>7. Certification Service Provider --<br/>8. Certificate Policies --<br/>9. Certification Paths: Retrieval and Validation --<br/>10. PKI in Practice --<br/>A. Basic Path Validation Algorithm --<br/>Solutions of the Exercise--<br/>Index
520 ## - SUMMARY, ETC.
Summary, etc The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures which for example support Internet security by authenticating software downloads and updates. Although PKC does not require the confidential exchange of secret keys, proper management of the private and public keys used in PKC is still of vital importance: the private keys must remain private, and the public keys must be verifiably authentic. So understanding so-called public key infrastructures (PKIs) that manage key pairs is at least as important as studying the ingenious mathematical ideas underlying PKC.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Public key infrastructure (Computer security)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Public-Key-Infrastruktur.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Buchmann, Johannes A.,
Relator term editor
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Karatsiolis, Evangelos,
Relator term editor
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Wiesmaier, Alexander,
Relator term editor
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Books
Holdings
Lost status Not for loan Permanent Location Current Location Date acquired Cost, normal purchase price Full call number Accession Number Koha item type
    ISI Library, Kolkata ISI Library, Kolkata 2015-08-13 3165.11 005.8 B918 136157 Books
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in


Visitor Counter