Products promising to secure electronic commerce and other Internet applications tend to rely heavily on cryptography. On occasion, it seems that constraints on the deployment of ‘strong’ cryptography remain the only obstacle on the path to achieving security. This chapter will point to other aspects of security that are fundamental prerequisites for the successful deployment of cryptography, viz computer security and security policy. To achieve the security their systems are striving for, researchers and developers alike will have to provide adequate solutions in these areas. Otherwise, the value of strong cryptography will be greatly diminished.
Complete Chapter List
Jonathan W. Palmer, Jamie Kliewer, Mark Sweat
Jairo A. Gutierrez
Fredj Dridi, Gustaf Neumann
Charles Prysby, Nicole Prysby