Affiliation:
1. University of Kashmir, India
Abstract
Information security has been the focus of research since decades; however, with the advent of Internet and its vast growth, online information security research has become recurrent. Novel methods, techniques, protocols, and procedures are continuously developed to secure information from growing threats. Digital signature certificates, currently offers one of the most trusted solutions to achieve CIA-trio for online information. This chapter discusses online information security through cryptography. It explains digital signature certificates; their benefits, the underlying standards, involved techniques, procedures, algorithms, processes, structure, management, formats, and illustration of their working. It highlights the potential of digital signatures and certificates in information security across different devices, services, and applications. It introduces a few useful tools to learn, train, and implement digital signature certificates.
Reference162 articles.
1. Adams, C., Pinkas, D., Cain, P., & Zuccherato, R. (2001). Internet X.509 Public Key Infrastructure Time Stamp Protocols (TSP). IETF RFC 3161, Retrieved from http://www.ietf.org/rfc/rfc3161.txt
2. Molecular Computation of Solutions to Combinatorial Problems
3. Adobe. (2012). Retrieved from http://blogs.adobe.com/security/2012/09/inappropriate-use-of-adobe-code-signing-certificate.html
4. Al-Riyami, S. S. Paterson, K. G. (2013). Certificateless Public Key Cryptography. Academic Press.
5. Allma, E. Callas, J. Delan, M. Libbey, M. Fenton J. Thomas, M. (2007). DomainKeys Identified Mail (DKIM). Internet Engineering Task Force (IETF), RFC 4871.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A new SM2-based ring signature scheme with revocability and anonymity;2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD);2024-05-08