Applications of Digital Signature Certificates for Online Information Security

Applications of Digital Signature Certificates for Online Information Security

ISBN13: 9781466694262|ISBN10: 1466694262|EISBN13: 9781466694279
DOI: 10.4018/978-1-4666-9426-2.ch007
Cite Chapter Cite Chapter

MLA

Banday, Mohammad Tariq. "Applications of Digital Signature Certificates for Online Information Security." Improving Information Security Practices through Computational Intelligence, edited by Wasan Awad, et al., IGI Global, 2016, pp. 149-197. https://doi.org/10.4018/978-1-4666-9426-2.ch007

APA

Banday, M. T. (2016). Applications of Digital Signature Certificates for Online Information Security. In W. Awad, E. El-Alfy, & Y. Al-Bastaki (Eds.), Improving Information Security Practices through Computational Intelligence (pp. 149-197). IGI Global. https://doi.org/10.4018/978-1-4666-9426-2.ch007

Chicago

Banday, Mohammad Tariq. "Applications of Digital Signature Certificates for Online Information Security." In Improving Information Security Practices through Computational Intelligence, edited by Wasan Awad, El Sayed M. El-Alfy, and Yousif Al-Bastaki, 149-197. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-4666-9426-2.ch007

Export Reference

Mendeley
Favorite

Abstract

Information security has been the focus of research since decades; however, with the advent of Internet and its vast growth, online information security research has become recurrent. Novel methods, techniques, protocols, and procedures are continuously developed to secure information from growing threats. Digital signature certificates, currently offers one of the most trusted solutions to achieve CIA-trio for online information. This chapter discusses online information security through cryptography. It explains digital signature certificates; their benefits, the underlying standards, involved techniques, procedures, algorithms, processes, structure, management, formats, and illustration of their working. It highlights the potential of digital signatures and certificates in information security across different devices, services, and applications. It introduces a few useful tools to learn, train, and implement digital signature certificates.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.