Reference Hub1
Applications of Digital Signature Certificates for Online Information Security

Applications of Digital Signature Certificates for Online Information Security

ISBN13: 9781522556343|ISBN10: 1522556346|EISBN13: 9781522556350
DOI: 10.4018/978-1-5225-5634-3.ch039
Cite Chapter Cite Chapter

MLA

Banday, Mohammad Tariq. "Applications of Digital Signature Certificates for Online Information Security." Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2018, pp. 756-803. https://doi.org/10.4018/978-1-5225-5634-3.ch039

APA

Banday, M. T. (2018). Applications of Digital Signature Certificates for Online Information Security. In I. Management Association (Ed.), Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (pp. 756-803). IGI Global. https://doi.org/10.4018/978-1-5225-5634-3.ch039

Chicago

Banday, Mohammad Tariq. "Applications of Digital Signature Certificates for Online Information Security." In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 756-803. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-5634-3.ch039

Export Reference

Mendeley
Favorite

Abstract

Information security has been the focus of research since decades; however, with the advent of Internet and its vast growth, online information security research has become recurrent. Novel methods, techniques, protocols, and procedures are continuously developed to secure information from growing threats. Digital signature certificates, currently offers one of the most trusted solutions to achieve CIA-trio for online information. This chapter discusses online information security through cryptography. It explains digital signature certificates; their benefits, the underlying standards, involved techniques, procedures, algorithms, processes, structure, management, formats, and illustration of their working. It highlights the potential of digital signatures and certificates in information security across different devices, services, and applications. It introduces a few useful tools to learn, train, and implement digital signature certificates.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.