CFP last date
22 April 2024
Reseach Article

PKI Endorsement Functions for Network users

Published on None 2011 by Sreekanth D
Computational Science - New Dimensions & Perspectives
Foundation of Computer Science USA
NCCSE - Number 3
None 2011
Authors: Sreekanth D
fb6fa78d-326d-46f9-b308-4106b0e1419e

Sreekanth D . PKI Endorsement Functions for Network users. Computational Science - New Dimensions & Perspectives. NCCSE, 3 (None 2011), 104-107.

@article{
author = { Sreekanth D },
title = { PKI Endorsement Functions for Network users },
journal = { Computational Science - New Dimensions & Perspectives },
issue_date = { None 2011 },
volume = { NCCSE },
number = { 3 },
month = { None },
year = { 2011 },
issn = 0975-8887,
pages = { 104-107 },
numpages = 4,
url = { /specialissues/nccse/number3/1869-171/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Computational Science - New Dimensions & Perspectives
%A Sreekanth D
%T PKI Endorsement Functions for Network users
%J Computational Science - New Dimensions & Perspectives
%@ 0975-8887
%V NCCSE
%N 3
%P 104-107
%D 2011
%I International Journal of Computer Applications
Abstract

Computer Business Systems and automated business transactions require robust and rigorous security measures. Public key cryptography supports security mechanisms such as confidentiality, integrity, authentication and non-repudiation. A Public Key Infrastructure (PKI) is a foundation on which other applications, systems and Network components are built.

References
  1. “Solution and Problems: (Why) It’s a long Way toInteroperability”, Jürgen Schwemmer, Datenschutz und Datensicherheit, No.9, 2001 (September 2001).
  2. “PKI: An Insider View”, Ben Rothke, Information Security Magazine, October 2001.
  3. “OpenPGP Message Format”, RFC 2440, Jon Callas, Lutz Donnerhacke, Hal Finney, and Rodney Thayer, November 1998.
  4. “SPKI Certificate Theory”, RFC 2693, Carl Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian Thomas, and Tatu Ylönen, September 1999.
  5. “Identity-Based Cryptosystems and Signature Schemes”, Adi Shamir, Proceedings of Crypto'84,
  6. “Cryptography: A New Dimension in Computer Data Security”, Carl Meyer and Stephen Matyas, John Wiley & Sons, 1982.
  7. “New Directions in Cryptography”, Whitfield Diffie and Martin Hellman, IEEE Transactions on Information Theory, Vol.22, No.6 (November 1976), p.644.
  8. “Security for Computer Networks : An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer”, Donald Davies and W.Price, John Wiley and Sons, 1984.
  9. “Replacing the Whois Protocol”, Andrew Newton,IEEE Internet Computing, Vol.10, No.4(July/August 2006), p.79.116
Index Terms

Computer Science
Information Sciences

Keywords

PKI Certificate management