dc.contributor.author | Χοχλιούρος, Ιωάννης | el |
dc.contributor.author | Σπηλιοπούλου, Αναστασία | el |
dc.contributor.author | Χοχλιούρος, Σ. | el |
dc.contributor.author | Βουδούρης, Κωνσταντίνος | el |
dc.date.accessioned | 2015-05-12T20:31:45Z | |
dc.date.issued | 2015-05-12 | |
dc.identifier.uri | http://hdl.handle.net/11400/10261 | |
dc.rights | Αναφορά Δημιουργού-Μη Εμπορική Χρήση-Όχι Παράγωγα Έργα 3.0 Ηνωμένες Πολιτείες | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.source | http://www.igi-global.com | en |
dc.subject | Τεχνολογία ελέγχου ταυτότητας | |
dc.subject | Ασφάλεια λογισμικού | |
dc.subject | Software protection | |
dc.title | European e-signatures solutions on the basis of PKI authentication technology | en |
heal.type | bookChapter | |
heal.classification | Technology | |
heal.classification | Electronics | |
heal.classification | Τεχνολογία | |
heal.classification | Ηλεκτρονική | |
heal.classificationURI | http://id.loc.gov/authorities/subjects/sh85133147 | |
heal.classificationURI | http://id.loc.gov/authorities/subjects/sh85042383 | |
heal.classificationURI | **N/A**-Τεχνολογία | |
heal.classificationURI | **N/A**-Ηλεκτρονική | |
heal.keywordURI | http://id.loc.gov/authorities/subjects/sh88001428 | |
heal.identifier.secondary | DOI: 10.4018/978-1-60566-204-6.ch018 | |
heal.dateAvailable | 10000-01-01 | |
heal.language | en | |
heal.access | forever | |
heal.publicationDate | 2009 | |
heal.bibliographicCitation | Chochliouros, J., Spiliopoulou, A., Chochliouros, S. and Voudouris, K. (2009) European e-signatures solutions on the basis of PKI authentication technology. In Politis, D. et al (eds.) Socioeconomic and Legal Implications of Electronic Intrusion. Hershey: IGI Global | en |
heal.abstract | This chapter presents systems of certification authorities and registration authorities and other supporting servers and agents that perform certificate management, archive management, key management, and token management functions. These activities that support security policy by monitoring and controlling security services, elements and mechanisms, distributing security information, and reporting security events are examined with the main focus on PKI authentication technology. | en |
heal.publisher | IGI Global Publications | en |
heal.fullTextAvailability | false | |
heal.bookName | Socioeconomic and Legal Implications of Electronic Intrusion | en |
Αρχεία | Μέγεθος | Μορφότυπο | Προβολή |
---|---|---|---|
Δεν υπάρχουν αρχεία που σχετίζονται με αυτό το τεκμήριο. |
Οι παρακάτω άδειες σχετίζονται με αυτό το τεκμήριο: