1. Public key infrastructure : building trusted applications and web services

by Vacca, John R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2004Availability: Items available for loan: [Call number: 005.8 VAC] (1).
2. Applied public key infrastructure : 4th International Workshop : IWAP 2005

by Zhou, Jianying.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Amsterdam: IOS Press, 2006Availability: Items available for loan: [Call number: 005.82 ZHO] (1).
3. Protocols for authentication and key establishment

by Boyd, Colin | Mathuria, Anish.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.82 BOY] (2).
4. Rethinking public key infrastructures and digital certificates: Building in privacy

by Brands, Stefan A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: The MIT Press, 2000Availability: Items available for loan: [Call number: 005.8 BRA] (2).
5. Secure key establishment

by Choo, Kim-Kwang Raymond.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 CHO] (1).
6. Understanding PKI: Concepts, standards and deployment considerations

by Adams, Carlisle | Lloyd, Steve.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2003Availability: Items available for loan: [Call number: 005.8 ADA] (1).
7. Beginning cryptography with Java

by Hook, David.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Wiley-India, 2005Availability: Items available for loan: [Call number: 005.8 HOO] (1).
8. Identity based encryption

by Chatterjee, Sanjit | Sarkar, Palash.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.82 CHA] (1).
9. Introduction to identity-based encryption

by Martin, Luther.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2008Availability: Items available for loan: [Call number: 005.82 MAR] (1).
10. PKI security solutions for the enterprise: Solving HIPAA, E-Paper Act and other compliance issues

by Raina, Kapil.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Indianapolis: John Wiley & Sons, 2003Availability: Items available for loan: [Call number: 005.8 RAI] (1).

Powered by Koha