Skip to main content

Abstract

This is a survey paper about recent PKI experiences in Serbia. These PKI projects are briefly described in the paper and include PKI systems for: National Bank of Serbia, commercial banks — especially sophisticated PKI system in Delta bank, Serbian ID smart card project, Serbian Academic Institution network — NIOnet, etc. Also, the activities on these projects are followed by activities in preparing the Electronic signature Law and SubLaw acts, as well as for preparing the Data Protection Law in Electronic Communications. Besides, there were some educational activities in domain of electronic business security and computer network security in which the author is included.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abrams, M.D., Joyce, M.V.: Trusted system concepts, Computers and Security, VOL. 14, No. 1, Elsevier Science Ltd., 1995.

    Google Scholar 

  2. Dordević, G., Unkašević, T., Marković, M.: Optimization of modular reduction procedure in RSA algorithm implementation on assembler of TMS320C54x signal processors, Proc. of DSP 2002, July, Santorini, Greece.

    Google Scholar 

  3. Ford, W., Baum, M.S.: Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption, Second Edition, Prentice Hall PTR, Upper Saddle River, NJ 07458, 2001.

    Google Scholar 

  4. Marković, M., Djordević, G., Unkašević, T.: Influence of key length in possible optimization of RSA algorithm implementation on signal processor, in Proc. of ICEST 2002, Oct., 1–4, pp. 23–26, 2002.

    Google Scholar 

  5. Marković, M., Dordević, G., Unkašević, T.: On Optimizing RSA Algorithm Implementation on Signal Processor Regarding Asymmetric Private Key Length, in Proceedings of WISP 2003, Budapest, Sept. 2003, pp. 73–77, 2003.

    Google Scholar 

  6. Marković, M.: Cryptographic Techniques and Security Protocols in Modern TCP/IP Computer Networks, Short-Tutorial, in Proc. of ICEST 2002, Oct., 1–4, 2002.

    Google Scholar 

  7. Marković, M., Savić, Z., Kovačević, B.: Secure Mobile Health Systems: Principles and Solutions, in M-Health: Emerging Mobile Health Systems, Robert H. Istepanian, Swamy Laxminarayan, Constantinos S. Pattichis, Editors, KLUWER ACADEMIC/PLENUM PUBLISHERS, to be published in 2004.

    Google Scholar 

  8. Marković, M., Unkašević, T., Dordević, G.: RSA algorithm optimization on assembler of TI TMS320C54x signal processors, in Proc. of EUSIPCO 2002, Toulouse, France, Sept. 3–6, 2002.

    Google Scholar 

  9. Marković, M., Savić, Z., Obrenović, Ž., Nikolić, A.: A PC Cryptographic Coprocessor Based on TI Signal Processor and Smart Card System, Communications and Multimedia Security Issues of the New Century, R. Steinmetz, J. Dittman, M. Steinebach, Eds., Kluwer Academic Publishers, 2001, pp. 383–393.

    Google Scholar 

  10. Oppliger, R.: Internet and Intranet Security, Artech House, 1998.

    Google Scholar 

  11. Oppliger, R.: Security Technologies for the World Wide Web, Artech House, ISBN 1-58053-045-1, 2000.

    Google Scholar 

  12. Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Commun, of the ACM, Vol. 21, No. 2, pp. 120–126, Feb. 1978.

    Article  MathSciNet  MATH  Google Scholar 

  13. RSA Laboratories, PKCS #1 v2.1: RSA Cryptography Standard, June 14, 2002.

    Google Scholar 

  14. RSA Laboratories, PKCS#7: Cryptographic Message Syntax Standard, Version 1.5, November 1993.

    Google Scholar 

  15. RSA Laboratories, PKCS#10 vl.7: Certification Request Syntax Standard, May 26, 2000.

    Google Scholar 

  16. RSA Laboratories, PKCS#11 v2.11: Cryptographic Token Interface Standard, Revision 1 — November 2001.

    Google Scholar 

  17. RSA Laboratories, PKCS#12 v1.0: Personal Information Exchange Syntax, June 24, 1999.

    Google Scholar 

  18. Savić, Z., Nikolić, A., Marković, M.: Cryptographic Proxy Gateways in Securing TCP/IP Computer Networks, in Proc. of Information Security Solution Europe Conference, ISSE 2001, London, September 26–28, 2001.

    Google Scholar 

  19. Savić, Z., Marković, M.: Development of Secure Web Financial Services in Serbia, in Proceedings of ISSE 2003, October 7–10, 2003.

    Google Scholar 

  20. Schneier, B.: Applied Cryptography, Second Edition, Protocols, Algorithms and Source Code in C, John Wiley & Sons, Inc., New York, Chichester, Brisbane, Toronto, Singapore, 1996.

    Google Scholar 

  21. Unkašević, T., Marković, M., Djordević, G.: Optimization of RSA algorithm implementation on TI TMS320C54x signal processors based on a modified Karatsuba-Offman’s algorithm, in Proc. of ECMCS′2001, 11–13 September, Budapest, 2001.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Friedr. Vieweg & Sohn Verlagsgesellschaft/GWV Fachverlage GmbH, Wiesbaden

About this chapter

Cite this chapter

Marković, M. (2004). Recent PKI Experiences in Serbia. In: ISSE 2004 — Securing Electronic Business Processes. Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-322-84984-7_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-322-84984-7_32

  • Publisher Name: Vieweg+Teubner Verlag

  • Print ISBN: 978-3-528-05910-1

  • Online ISBN: 978-3-322-84984-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics