Bibliography

[ch16bib01] T. Austin, PKI: A Wiley Tech Brief. New York: Wiley, <year>2000</year>. [Aust00]

[ch16bib02] J., Feghhi, J. Feghhi,and P. Williams. Digital Certificates: Applied Internet Security. Reading, MA: Addison-Wesley, <year>1999</year>. [FFW99]

[ch16bib03] W., Ford, and M. Baum. Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption (2nd ed.). Englewood Cliffs, NJ: Prentice Hall, <year>2000</year>. [FoBa00]

[ch16bib04] R., Housley, and T. Polk. Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure. New York: Wiley, <year>2001</year>. [HoPo01]

[ch16bib05] A., Menezes, P. van Oorschot, and S. Vanstone. Handbook of Applied Cryptography. Boca Raton, FL: CRC Press , <year>1997</year> ...

Get Understanding PKI: Concepts, Standards, and Deployment Considerations, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.