Download WordPress Themes, Happy Birthday Wishes
Home » Computer » Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy

Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy

  • Category: Computer
  • Author: Stefan Brands
  • Pages: 356 pages
  • File type: Online, PDF files

Read and download free eBook intituled Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy in format Online, PDF files – 356 pages created by Stefan Brands.

As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts believe that digital certificates offer the best technology for safeguarding electronic communications. They are already widely used for authenticating and encrypting email and software, and eventually will be built into any device or piece of software that must be able to communicate securely. There is a serious problem, however, with this unavoidable trend: unless drastic measures are taken, everyone will be forced to communicate via what will be the most pervasive electronic surveillance tool ever built. There will also be abundant opportunity for misuse of digital certificates by hackers, unscrupulous employees, government agencies, financial institutions, insurance companies, and so on.

In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens: anyone can establish their validity and the data they specify, but no more than that. Furthermore, different actions by the same person cannot be linked. Certificate holders have control over what information is disclosed, and to whom. Subsets of the proposed cryptographic building blocks can be used in combination, allowing a cookbook approach to the design of public key infrastructures. Potential applications include electronic cash, electronic postage, digital rights management, pseudonyms for online chat rooms, health care information storage, electronic voting, and even electronic gambling.

READ  Linear Regression Using R: An Introduction to Data Modeling

Read and Download Links:

Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy

Leave a Reply

Your email address will not be published. Required fields are marked *

*

x

Check Also

The Linux Command Line

Read and download free Book intituled The Linux Command Line in format PDF written by William Shotts.