Mobile Public Key Infrastructures

Mobile Public Key Infrastructures

I. Chochliouros, G. Lalopoulos, S. Chochliouros, A. Spiliopoulou
Copyright: © 2007 |Pages: 8
DOI: 10.4018/978-1-59904-002-8.ch097
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

From today’s perspective, network and information security (European Commission, 2001) is about ensuring the availability of services and data; preventing the disruption and unauthorized interception of communications; confirming that data sent, received, or stored is complete and unchanged; securing data confidentiality; protecting information systems against unauthorized access; and protecting against attacks (involving malicious software and securing dependable authentication—that is, the confirming of an asserted identity of entities or users). Specific security measures therefore should be taken in order to establish an appropriate environment.

Complete Chapter List

Search this Book:
Reset