Limit search to available items
Add Marked to Bag Add All On Page Add Marked to My Lists
Subjects (1-40 of 40)
Public key infrastructure (Computer security)
1
E-book
2005

Applied public key infrastructure : 4th International Workshop : IWAP 2005


International Workshop for Applied PKI (4th : 2005 : Singapore)



Rating:

 
2
Book
2009

Authentication in public key encryption schemes


Palavestra, Ana

[Place of publication not identified] : [publisher not identified], 2009

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  005.8 Pal/Aip  AVAILABLE
3
E-book
2005

Beginning cryptography with Java


Hook, David, 1962-



Rating:

 
4
Book
2014

Bulletproof SSL and TLS


Ristic, Ivan, author

London : Feisty duck, 2014

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  005.8 Ris/Bss  AVAILABLE
6
Book
2003

Critical infrastructure protection


Marasea, P

Geelong, Vic. : Deakin University, School of Information Technology, 2003

Rating:

 
 
Location Call no. Vol. Availability
 ADPML SPDU  363.6 Mar/Cip  LIB USE ONLY
8
Book
2008

Introduction to identity-based encryption


Martin, Luther.

Boston : Artech House, [2008]

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  005.82 Mar/Iti  AVAILABLE
10
E-book
2013

Introduction to public key infrastructures


Buchmann, Johannes, author.

Heidelberg : Springer, 2013

Rating:

 
11
E-book
2023

PKI implementation and infrastructures


Ashbourn, Julian, 1952- author.
First edition
Boca Raton, FL : CRC Press, 2023

Rating:

 
12
E-book
2011

PKI uncovered


Karamanian, Andre.



Rating:

 
13
E-book
2020

Protocols for authentication and key establishment


Boyd, Colin, 1959- author.
Second edition
Berlin, Germany : Springer, 2020

Rating:

 
14
15
E-book
2014

Public-key cryptography-- PKC 2014 : 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014 : proceedings


International Workshop on Practice and Theory in Public Key Cryptography (17th : 2014 : Buenos Aires, Argentina)

Berlin : Springer, 2014

Rating:

 
21
26
E-book
2013

Quantum attacks on public-key cryptosystems


Yan, Song Y., author.

New York : Springer, [2013]

Rating:

 
27
Book
2009

Secure key establishment


Choo, Kim-Kwang Raymond.

New York : Springer, [2009]

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  005.82 Cho/Ske  AVAILABLE
28
E-book
2009

Secure key establishment


Choo, Kim-Kwang Raymond.



Rating:

 
30
E-book
2015

Security without obscurity : a guide to PKI operations


Stapleton, Jeffrey James, author.

Boca Raton, FL : CRC Press, [2015]

Rating:

 
31
Book
2003

System survivability : the EASEL way


Redman, John.

Geelong, Vic. : Deakin University, School of Information Technology, 2003

Rating:

 
 
Location Call no. Vol. Availability
 ADPML SPDU  005.8 Red/Sst  LIB USE ONLY
37
E-book
2009

Trusted computing : Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings


International Conference on Trusted Computing and Trust in Information Technologies (2nd : 2009 : Oxford, England)



Rating:

 
38
Book
2003

Understanding PKI : concepts, standards, and deployment considerations


Adams, Carlisle, 1961-
Second edition
Boston : Addison-Wesley, 2003

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  005.8 Llo/Upc 2003  AVAILABLE
Add Marked to Bag Add All On Page
Locate in results