1. Public key infrastructure : building trusted applications and Web services /: building trusted applications and Web services. (©2004) Other Names: Vacca, John R Record Type: Book Extent: 1 online resource (xl, 404 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Policymaking for critical infrastructure : a case study on strategic interventions in public safety telecommunications /: a case study on strategic interventions in public safety telecommunications. (2019) Authors: Gow, Gordon A Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Introduction to certificateless cryptography. (2016) Authors: Xiong, Hu; Qin, Zhen, 1982-; Vasilakos, Athanasios Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. PKI implementation and infrastructures. (2023) Authors: Ashbourn, Julian, 1952- Record Type: Book Extent: 1 online resource (171 pages), illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Governance, risk, and compliance for PKI operations. (2016) Authors: Stapleton, Jeffrey James; Epstein, W. Clay Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗