|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBOOKCENTRAL_ocn228144574 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
050722s2005 ne a ob 101 0 eng d |
010 |
|
|
|a 2005931171
|
040 |
|
|
|a Nz
|b eng
|e pn
|c UV0
|d OCLCQ
|d N$T
|d YDXCP
|d IOSPR
|d OCLCE
|d IDEBK
|d OCLCQ
|d DKDLA
|d MERUC
|d CCO
|d E7B
|d MHW
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCL
|d OCLCQ
|d EBLCP
|d OCLCQ
|d AZK
|d OCLCQ
|d LOA
|d AGLDB
|d MOR
|d PIFBR
|d ZCU
|d OCLCQ
|d U3W
|d BRL
|d STF
|d WRM
|d OCLCQ
|d VTS
|d ICG
|d NRAMU
|d EZ9
|d MOQ
|d INT
|d VT2
|d OCLCQ
|d WYU
|d G3B
|d OCLCQ
|d DKC
|d CEF
|d OCLCQ
|d UX1
|d CNNOR
|d ADU
|d UKCRE
|d VLY
|d AU@
|d OCLCQ
|d OCLCO
|d M8D
|d SFB
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 71550831
|a 148603139
|a 228144575
|a 474161474
|a 488325084
|a 491259298
|a 560230706
|a 607774945
|a 647517823
|a 657537613
|a 722472958
|a 728019579
|a 744968345
|a 814456755
|a 824550542
|a 961589593
|a 962652907
|a 965973553
|a 974201061
|a 974455834
|a 980253677
|a 988523134
|a 991584207
|a 991989982
|a 1005639747
|a 1017996862
|a 1037463753
|a 1038670811
|a 1042317824
|a 1045526033
|a 1049072403
|a 1055256959
|a 1055328336
|a 1066439470
|a 1081240052
|a 1096477179
|a 1100531499
|a 1101719070
|a 1112243845
|a 1113173644
|a 1119036959
|a 1119966136
|a 1135961701
|a 1153540117
|a 1162558192
|a 1228564236
|a 1241846695
|a 1290078431
|a 1300653318
|
020 |
|
|
|a 1423799690
|q (electronic bk.)
|
020 |
|
|
|a 9781423799696
|q (electronic bk.)
|
020 |
|
|
|a 9781607501367
|
020 |
|
|
|a 1607501368
|
020 |
|
|
|a 6610505004
|
020 |
|
|
|a 1280505001
|
020 |
|
|
|a 9781280505003
|
020 |
|
|
|a 9786610505005
|
020 |
|
|
|a 6000003455
|
020 |
|
|
|a 9786000003456
|
020 |
|
|
|a 1601291175
|
020 |
|
|
|a 9781601291172
|
020 |
|
|
|z 1586035509
|
020 |
|
|
|z 9781586035501
|
029 |
0 |
|
|a NZ1
|b 12046455
|
029 |
1 |
|
|a AU@
|b 000046687172
|
029 |
1 |
|
|a AU@
|b 000048781313
|
029 |
1 |
|
|a AU@
|b 000051451608
|
029 |
1 |
|
|a DEBBG
|b BV043161199
|
029 |
1 |
|
|a DEBBG
|b BV044083674
|
029 |
1 |
|
|a DEBSZ
|b 422266299
|
029 |
1 |
|
|a GBVCP
|b 802573428
|
029 |
1 |
|
|a YDXCP
|b 2470902
|
035 |
|
|
|a (OCoLC)228144574
|z (OCoLC)71550831
|z (OCoLC)148603139
|z (OCoLC)228144575
|z (OCoLC)474161474
|z (OCoLC)488325084
|z (OCoLC)491259298
|z (OCoLC)560230706
|z (OCoLC)607774945
|z (OCoLC)647517823
|z (OCoLC)657537613
|z (OCoLC)722472958
|z (OCoLC)728019579
|z (OCoLC)744968345
|z (OCoLC)814456755
|z (OCoLC)824550542
|z (OCoLC)961589593
|z (OCoLC)962652907
|z (OCoLC)965973553
|z (OCoLC)974201061
|z (OCoLC)974455834
|z (OCoLC)980253677
|z (OCoLC)988523134
|z (OCoLC)991584207
|z (OCoLC)991989982
|z (OCoLC)1005639747
|z (OCoLC)1017996862
|z (OCoLC)1037463753
|z (OCoLC)1038670811
|z (OCoLC)1042317824
|z (OCoLC)1045526033
|z (OCoLC)1049072403
|z (OCoLC)1055256959
|z (OCoLC)1055328336
|z (OCoLC)1066439470
|z (OCoLC)1081240052
|z (OCoLC)1096477179
|z (OCoLC)1100531499
|z (OCoLC)1101719070
|z (OCoLC)1112243845
|z (OCoLC)1113173644
|z (OCoLC)1119036959
|z (OCoLC)1119966136
|z (OCoLC)1135961701
|z (OCoLC)1153540117
|z (OCoLC)1162558192
|z (OCoLC)1228564236
|z (OCoLC)1241846695
|z (OCoLC)1290078431
|z (OCoLC)1300653318
|
037 |
|
|
|a 978-1-58603-550-1
|b IOS Press
|n http://www.iospress.nl
|
042 |
|
|
|a dlr
|
050 |
|
4 |
|a QA76.9.A25
|b I558 2005eb
|
072 |
|
7 |
|a COM
|x COM004000
|2 bisacsh
|
072 |
|
7 |
|a K
|2 bicssc
|
082 |
0 |
4 |
|a 005.8/2
|2 22
|
049 |
|
|
|a UAMI
|
111 |
2 |
|
|a International Workshop for Applied PKI
|n (4th :
|d 2005 :
|c Singapore)
|
245 |
1 |
0 |
|a Applied public key infrastructure :
|b 4th International Workshop : IWAP 2005 /
|c edited by Jianying Zhou [and others].
|
246 |
3 |
0 |
|a IWAP 2005
|
260 |
|
|
|a Amsterdam ;
|a Washington, DC :
|b IOS Press,
|c ©2005.
|
300 |
|
|
|a 1 online resource (x, 265 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
490 |
1 |
|
|a Frontiers in artificial intelligence and applications ;
|v v. 128
|
504 |
|
|
|a Includes bibliographical references and author index.
|
505 |
0 |
|
|a Title page; Preface; Program Committee; Contents; PKI Operation & Case Study; Non-Repudiation; Authorization & Access Control; Authentication & Time-Stamping; Certificate Validation & Revocation; Cryptographic Applications; Author Index.
|
588 |
0 |
|
|a Print version record.
|
506 |
|
|
|3 Use copy
|f Restrictions unspecified
|2 star
|5 MiAaHDL
|
533 |
|
|
|a Electronic reproduction.
|b [Place of publication not identified] :
|c HathiTrust Digital Library,
|d 2010.
|5 MiAaHDL
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2010
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
520 |
|
|
|a Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related operations through the sharing of case studies are critical to supporting the continued research and development of PKI technologies and related systems and appliations to further progress and innovate for enhancing future development and evolution of PKI in the enterprises. This publication includes topics such as: PKI Operation & Case Study; Non-repudiation; Authorization & Access Control, Authentication & Time-tamping, Certificate Validation & Revocation and Cryptographic Applications.
|
546 |
|
|
|a English.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Public key infrastructure (Computer security)
|v Congresses.
|
650 |
|
0 |
|a Public key cryptography
|v Congresses.
|
650 |
|
6 |
|a Infrastructure à clé publique (Sécurité informatique)
|v Congrès.
|
650 |
|
6 |
|a Cryptographie à clé publique
|v Congrès.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x Cryptography.
|2 bisacsh
|
650 |
|
7 |
|a Public key cryptography
|2 fast
|
650 |
|
7 |
|a Public key infrastructure (Computer security)
|2 fast
|
655 |
|
7 |
|a Conference papers and proceedings
|2 fast
|
700 |
1 |
|
|a Zhou, Jianying.
|
758 |
|
|
|i has work:
|a Applied public key infrastructure (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCYBtWQbtmBJVvHd8f4tJwy
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a International Workshop for Applied PKI (4th : 2005 : Singapore).
|t Applied public key infrastructure.
|d Amsterdam ; Washington, DC : IOS Press, ©2005
|w (DLC) 2005931171
|
830 |
|
0 |
|a Frontiers in artificial intelligence and applications ;
|v v. 128.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=265956
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL265956
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 163999
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2470902
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3207153
|
994 |
|
|
|a 92
|b IZTAP
|