top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA) : 9-10 September 2022 / / Institute of Electrical and Electronics Engineers
2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA) : 9-10 September 2022 / / Institute of Electrical and Electronics Engineers
Pubbl/distr/stampa Piscataway, NJ : , : IEEE, , [2022]
Descrizione fisica 1 online resource : illustrations
Disciplina 005.8
Soggetto topico Public key infrastructure (Computer security)
Computer security
ISBN 1-66548-883-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Random Number Generation for PKI Using Controlled Anderson PUF -- A hybrid hyperchaotic based dynamic keystream generator using perturbance process for public key infrastructure application -- Radian: Leveraging PKI for Long-Term Validation Enabled Digital Academic Testimonials - A Case-Study -- A Study of PKI Ecosystem in South Asian and Oceania Countries -- Security Analysis of LDPC Code-Based Encryption -- FPGA based High Throughput Substitution Box Architectures for Lightweight Block Ciphers -- Public Key Cryptographic Implementation Validation: A Review -- Evolving Role of PKI in Facilitating Trust -- Towards Automated PKI Trust Transfer for IoT -- Improved PKI Certificate Lifecycle Management With Centralized Device Management For Industrial IoT -- Identity of Things (IDoT): A Preliminary Report on Identity Management Solutions for IoT Devices -- Experimentation on Usage of PQC Algorithms for eSign -- A JSON Web Signature Based Adaptive Authentication Modality for Healthcare Applications -- PKI for IoT using the DNS infrastructure -- Unconfirmed Transactions in Cryptocurrency: Reasons, Statistics, and Mitigation.
Record Nr. UNISA-996575134803316
Piscataway, NJ : , : IEEE, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
APKC '17 : proceedings of the 4th ACM International Workshop on Asia Public-Key Cryptography : April 2, 2017, Abu Dhabi, UAE / / sponsored by ACM SIGSAC
APKC '17 : proceedings of the 4th ACM International Workshop on Asia Public-Key Cryptography : April 2, 2017, Abu Dhabi, UAE / / sponsored by ACM SIGSAC
Pubbl/distr/stampa New York : , : ACM, , 2017
Descrizione fisica 1 online resource (52 pages)
Disciplina 005.8
Soggetto topico Public key infrastructure (Computer security)
Public key cryptography
Data encryption (Computer science)
Soggetto genere / forma Electronic books.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Asia Public-Key Cryptography 2017 : proceedings of the 4th Association for Computing Machinery International Workshop on Asia Public-Key Cryptography : April 2, 2017, Abu Dhabi, UAE
Proceedings of the 4th ACM International Workshop on ASIA Public-Key Cryptography
Proceedings of the 4th Association for Computing Machinery International Workshop on ASIA Public-Key Cryptography
Record Nr. UNINA-9910375792303321
New York : , : ACM, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applied public key infrastructure [[electronic resource] ] : 4th International Workshop : IWAP 2005 / / edited by Jianying Zhou ... [et al.]
Applied public key infrastructure [[electronic resource] ] : 4th International Workshop : IWAP 2005 / / edited by Jianying Zhou ... [et al.]
Pubbl/distr/stampa Amsterdam ; ; Washington, DC, : IOS Press, c2005
Descrizione fisica 1 online resource (276 p.)
Disciplina 005.8/2
Altri autori (Persone) ZhouJianying
Collana Frontiers in artificial intelligence and applications
Soggetto topico Public key infrastructure (Computer security)
Public key cryptography
Soggetto genere / forma Electronic books.
ISBN 6610505004
1-280-50500-1
9786610505005
1-4237-9969-0
1-60750-136-8
600-00-0345-5
1-60129-117-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Title page; Preface; Program Committee; Contents; PKI Operation & Case Study; Non-Repudiation; Authorization & Access Control; Authentication & Time-Stamping; Certificate Validation & Revocation; Cryptographic Applications; Author Index
Record Nr. UNINA-9910449822303321
Amsterdam ; ; Washington, DC, : IOS Press, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applied public key infrastructure [[electronic resource] ] : 4th International Workshop : IWAP 2005 / / edited by Jianying Zhou ... [et al.]
Applied public key infrastructure [[electronic resource] ] : 4th International Workshop : IWAP 2005 / / edited by Jianying Zhou ... [et al.]
Pubbl/distr/stampa Amsterdam ; ; Washington, DC, : IOS Press, c2005
Descrizione fisica 1 online resource (276 p.)
Disciplina 005.8/2
Altri autori (Persone) ZhouJianying
Collana Frontiers in artificial intelligence and applications
Soggetto topico Public key infrastructure (Computer security)
Public key cryptography
ISBN 6610505004
1-280-50500-1
9786610505005
1-4237-9969-0
1-60750-136-8
600-00-0345-5
1-60129-117-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Title page; Preface; Program Committee; Contents; PKI Operation & Case Study; Non-Repudiation; Authorization & Access Control; Authentication & Time-Stamping; Certificate Validation & Revocation; Cryptographic Applications; Author Index
Record Nr. UNINA-9910783420803321
Amsterdam ; ; Washington, DC, : IOS Press, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applied public key infrastructure : 4th International Workshop : IWAP 2005 / / edited by Jianying Zhou ... [et al.]
Applied public key infrastructure : 4th International Workshop : IWAP 2005 / / edited by Jianying Zhou ... [et al.]
Edizione [1st ed.]
Pubbl/distr/stampa Amsterdam ; ; Washington, DC, : IOS Press, c2005
Descrizione fisica 1 online resource (276 p.)
Disciplina 005.8/2
Altri autori (Persone) ZhouJianying
Collana Frontiers in artificial intelligence and applications
Soggetto topico Public key infrastructure (Computer security)
Public key cryptography
ISBN 6610505004
1-280-50500-1
9786610505005
1-4237-9969-0
1-60750-136-8
600-00-0345-5
1-60129-117-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Title page; Preface; Program Committee; Contents; PKI Operation & Case Study; Non-Repudiation; Authorization & Access Control; Authentication & Time-Stamping; Certificate Validation & Revocation; Cryptographic Applications; Author Index
Altri titoli varianti IWAP 2005
Record Nr. UNINA-9910821280503321
Amsterdam ; ; Washington, DC, : IOS Press, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
AsiaPKC '16 : proceedings of the 3rd ACM International Workshop on Asia Public-Key Cryptography : May 30, 2016, Xi'an, China / / sponsored by ACM SIGSAC
AsiaPKC '16 : proceedings of the 3rd ACM International Workshop on Asia Public-Key Cryptography : May 30, 2016, Xi'an, China / / sponsored by ACM SIGSAC
Pubbl/distr/stampa New York : , : ACM, , 2016
Descrizione fisica 1 online resource (62 pages)
Disciplina 005.8
Soggetto topico Public key infrastructure (Computer security)
Public key cryptography
Data encryption (Computer science)
Soggetto genere / forma Electronic books.
ISBN 1-4503-4286-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Asia Public-Key Cryptography 2016 : proceedings of the 3rd Association for Computing Machinery International Workshop on Asia Public-Key Cryptography : May 30, 2016, Xi'an, China
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography
Proceedings of the 3rd Association for Computing Machinery International Workshop on ASIA Public-Key Cryptography
Record Nr. UNINA-9910376345403321
New York : , : ACM, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Electronic authentication guideline [[electronic resource] ] : recommendations of the National Institute of Standards and Technology / / William E. Burr, Donna F. Dodson, W. Timothy Polk
Electronic authentication guideline [[electronic resource] ] : recommendations of the National Institute of Standards and Technology / / William E. Burr, Donna F. Dodson, W. Timothy Polk
Autore Burr William E
Edizione [Version 1.0.2.]
Pubbl/distr/stampa Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2006]
Descrizione fisica x, 54 pages : digital, PDF file
Altri autori (Persone) BurrWilliam E
Collana NIST special publication ;Information security
Soggetto topico Electronic commerce - Security measures - Standards
Public key infrastructure (Computer security)
Electronic data interchange
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Electronic authentication guideline
Record Nr. UNINA-9910695290603321
Burr William E  
Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2006]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Implementing PKI Services on z/OS [[electronic resource] /] / [Chris Rayns ... et al.]
Implementing PKI Services on z/OS [[electronic resource] /] / [Chris Rayns ... et al.]
Edizione [1st ed.]
Pubbl/distr/stampa [S.l.], : IBM, International Technical Support Organization, c2004
Descrizione fisica xii, 346 p. : ill
Disciplina 005.8
Altri autori (Persone) RaynsChris
Collana IBM redbooks
Soggetto topico Public key infrastructure (Computer security)
Computer networks - Security measures
Soggetto genere / forma Electronic books.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910449722203321
[S.l.], : IBM, International Technical Support Organization, c2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Implementing PKI Services on z/OS [[electronic resource] /] / [Chris Rayns ... et al.]
Implementing PKI Services on z/OS [[electronic resource] /] / [Chris Rayns ... et al.]
Edizione [1st ed.]
Pubbl/distr/stampa [S.l.], : IBM, International Technical Support Organization, c2004
Descrizione fisica xii, 346 p. : ill
Disciplina 005.8
Altri autori (Persone) RaynsChris
Collana IBM redbooks
Soggetto topico Public key infrastructure (Computer security)
Computer networks - Security measures
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910783541203321
[S.l.], : IBM, International Technical Support Organization, c2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Implementing PKI Services on z/OS / / [Chris Rayns ... et al.]
Implementing PKI Services on z/OS / / [Chris Rayns ... et al.]
Edizione [1st ed.]
Pubbl/distr/stampa [S.l.], : IBM, International Technical Support Organization, c2004
Descrizione fisica xii, 346 p. : ill
Disciplina 005.8
Altri autori (Persone) RaynsChris
Collana IBM redbooks
Soggetto topico Public key infrastructure (Computer security)
Computer networks - Security measures
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Chapter 1. Security Server PKI Services -- 1.1 Overview of digital certificate -- 1.2 The PKIX standards -- 1.2.1 CA hierarchy -- 1.2.2 The X.509 certificate and Certificate Revocation List -- 1.2.3 The x.509 v3 certificate extension fields -- 1.2.4 Certificate and CRL appearance -- 1.3 The z/OS PKI Services -- 1.3.1 Security Server PKI Services in z/OS -- 1.3.2 Prerequisite products -- 1.3.3 Requests supported by z/OS PKI Services -- 1.3.4 Browser and server certificates -- 1.3.5 The z/OS PKI Services architecture -- 1.4 Security Server PKI Services enhancement in z/OS V1R4 -- 1.4.1 Sysplex support -- 1.4.2 Event notification via e-mail -- 1.4.3 Additional distinguished name qualifier support -- 1.4.4 LDAP password encryption -- 1.4.5 PKCS#7 certificate chain support -- 1.4.6 Key generation via PCICC -- 1.4.7 Additional default CERTAUTH -- 1.4.8 Summary of z/OS PKI external characteristics as of z/OS V1R4 -- Chapter 2. RACF for PKI Services -- 2.1 Introduction to creating an RACF environment for new products -- 2.1.1 RACF group structure -- 2.1.2 Machine user IDs -- 2.1.3 System data set profiles -- 2.1.4 Ownership -- 2.2 New RACF features -- 2.2.1 Access control lists -- 2.2.2 Automatic assignment of UID/GID -- 2.3 Setting up RACF environment for PKI prerequisites -- 2.3.1 z/OS UNIX level security -- 2.3.2 RACF for Web server -- 2.3.3 RACF for OCSF and OCEP -- 2.3.4 RACF for LDAP -- 2.3.5 RACF for ICSF -- 2.4 Setting up the RACF environment for PKI Services -- 2.4.1 Add RACF groups for PKI Services -- 2.4.2 Adding RACF user IDs for PKI Services -- 2.4.3 Adding PKI data set profiles -- 2.4.4 Using RACF to create certificates -- 2.4.5 Daemon and server control for PKI user ID and surrogate user ID.
2.4.6 Allow PKI user ID to act as CA -- 2.4.7 Allow Web server to access its own key ring -- 2.4.8 Allow Web server user ID to switch identity to surrogate user ID -- 2.4.9 Profile for PKI Services procedure in class STARTED -- 2.4.10 Allow access for PKISTU to OCSF -- 2.4.11 ICSF -- 2.4.12 Protect certificate functions -- 2.5 RACF administration for PKI Services -- 2.5.1 Creating a help desk function -- 2.5.2 Administering certificates with the HostIdMappings extension -- 2.5.3 Display your PKI Services certificates -- 2.5.4 Establishing PKI Services as intermediate certificate authority -- 2.5.5 Renewing your PKI Services CA certificate -- 2.5.6 Recovering a CA certificate profile -- 2.5.7 Controlling applications that call R_PKIServ -- 2.5.8 Using encrypted passwords for LDAP servers -- 2.5.9 Register a Personal Certificate with RACF -- Chapter 3. Easy steps to get PKI up and running -- 3.1 Preparing the PKI Server installation -- 3.1.1 Steps to set up the PKI server -- 3.2 Prepare and configure the environment -- 3.3 Setting up the Web servers for PKI -- 3.3.1 Why do we need two Web servers? -- 3.3.2 Setting up the Web server as a secure Web server -- 3.3.3 Customizing the Web server for SSL -- 3.3.4 Customizing the first Web server for PKI -- 3.3.5 Customizing the second Web server for PKI -- 3.4 Setting up the LDAP server for PKI -- 3.4.1 LDAP setup: running the ldapcnf utility -- 3.5 Setting up the PKI Services task -- 3.6 Configure OCSF and OCEP to work with PKI Services -- 3.7 Configure the PKI Services -- 3.7.1 Set up the environment variables for PKI Services -- 3.7.2 Customizing the PKI Services configuration file -- 3.7.3 Customizing the PKI template -- 3.8 Checking the VSAM data set -- Chapter 4. Customizing the z/OS PKI Services: the template file -- 4.1 The template file, CGI, and the Web end user -- 4.1.1 The template file sections.
4.1.2 The CGI modules -- 4.1.3 Relationship between CGI modules and Web user templates -- 4.1.4 An example of simple customization of the template file -- 4.2 Structure of the template file for interaction with the PKI Administrator -- 4.2.1 The CGI modules -- 4.2.2 Customization of the administration Web pages -- 4.2.3 PKI administrator e-mail address -- 4.2.4 PKI Services certification policy -- 4.2.5 Link to PKI Services from your home page -- 4.2.6 Certificate authentication for administrators -- Chapter 5. PKI Installation using the IKYSETUP REXX exec -- 5.1 IKYSETUP overview -- 5.2 IKYSETUP variables -- 5.2.1 Compulsory changes to IKYSETUP -- 5.2.2 Probable changes to IKYSETUP -- 5.2.3 Optional changes to IKYSETUP -- Chapter 6. PKI Exit -- 6.1 PKI Exit main routine -- 6.2 Steps for installing and modifying the exit code sample -- 6.3 Test for scenario 1 -- Chapter 7. PKI Services and the Cryptographic Coprocessor -- 7.1 Introduction to Cryptography Solution on S/390 - zSeries -- 7.1.1 Cryptographic Coprocessor Feature (CCF) -- 7.1.2 PCI Cryptographic Coprocessor (PCICC) -- 7.1.3 PCI Cryptographic Accelerator (PCICA) -- 7.1.4 Assigning coprocessors to an LPAR -- 7.2 Cryptographic solution on z990 -- 7.2.1 CP Assist for Cryptographic Function -- 7.2.2 PCI Extended Cryptographic Coprocessor -- 7.2.3 Software requirements -- 7.3 Integrated Cryptographic Services Facility -- 7.3.1 CKDS and PKDS -- 7.3.2 Controlling access to ICSF resources -- 7.4 Boosting SSL connection with hardware encryption -- 7.4.1 Secure Sockets Layer (SSL) -- 7.4.2 IBM HTTP Server accessing the cryptographic coprocessor -- 7.4.3 Checking hardware encryption for Web server encryption -- 7.5 Keeping your CA signature key secure with ICSF -- 7.5.1 RACF taking advantage of ICSF -- 7.6 Sharing PKDS in a sysplex environment -- Chapter 8. LDAP enhancements for availability.
8.1 Optional LDAP enhancements for availability -- 8.1.1 Redundancy -- Appendix A. PKI Exit sample -- Appendix B. List of sample files provided with PKI Services -- httpd.conf sample for PKI Web server 1 -- httpd.envvars sample for the PKI Web server -- httpd.conf sample for PKI Web server 2 -- pkiserv.conf -- pkiserv.envars -- pkiserv.tmpl -- PKI Services subcomponents and message levels -- JCL samples -- Related publications -- IBM Redbooks -- Other publications -- Online resources -- How to get IBM Redbooks -- Index -- Back cover.
Record Nr. UNINA-9910824358303321
[S.l.], : IBM, International Technical Support Organization, c2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui