Ten risks of PKI: in favour of smart card-based PKI (English)
- New search for: Corell, S.
- New search for: Corell, S.
In:
Network Security
;
2000
;
issue 5/12-issue 5/14
;
2000
-
ISSN:
- Article (Journal) / Print
-
Title:Ten risks of PKI: in favour of smart card-based PKI
-
Contributors:Corell, S. ( author )
-
Published in:Network Security ; 2000 ; issue 5/12-issue 5/14
-
Publisher:
-
Publication date:2000
-
Size:3 Seiten
-
ISSN:
-
Coden:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 2000
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- issue 1/8
-
Information security, business and the Internet-Part 1Blatchford, C. et al. | 2000
- issue 1/13
-
Signing the E-wordHumphreys, T. et al. | 2000
- issue 1/14
-
Top 10 challenges to securing a networkBarnett, S. et al. | 2000
- issue 2/6
-
Intrusion detection revisitedSchultz, E.E. et al. | 2000
- issue 2/10
-
Information security, business and the Internet. Part 2Blatchford, C. et al. | 2000
- issue 2/17
-
Worker monitoringCohen, F. et al. | 2000
- issue 4/7
-
Government support for secure electronic commerceHickson, N. et al. | 2000
- issue 4/12
-
Challenging the conventional view of PKI: will it really work?Landrok, P. et al. | 2000
- issue 5/12
-
Ten risks of PKI: in favour of smart card-based PKICorell, S. et al. | 2000
- issue 7/7
-
Auditing electronic mailWebb, A. et al. | 2000
- issue 8/11
-
Understanding viruses bio-logicallyCohen, F. et al. | 2000
- issue 9/13
-
The impact of quantum computing on cryptographyWright, M.A. et al. | 2000
- issue 9/16
-
Chipping (network security management)Cohen, F. et al. | 2000
- issue 10/10
-
Building trust into online businessMcDermott, P. et al. | 2000
- issue 12/12
-
Privacy and security in wireless computingKakalik, J.S. / Wright, M.A. et al. | 2000