Public Key Infrastructure: Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings

Author:   Andrea S. Atzeni ,  Antonio Lioy
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2006 ed.
Volume:   4043
ISBN:  

9783540351511


Pages:   264
Publication Date:   13 June 2006
Format:   Paperback
Availability:   Out of print, replaced by POD   Availability explained
We will order this item for you from a manufatured on demand supplier.

Our Price $184.67 Quantity:  
Add to Cart

Share |

Public Key Infrastructure: Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings


Add your own review!

Overview

Full Product Details

Author:   Andrea S. Atzeni ,  Antonio Lioy
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2006 ed.
Volume:   4043
Dimensions:   Width: 15.50cm , Height: 1.40cm , Length: 23.50cm
Weight:   0.870kg
ISBN:  

9783540351511


ISBN 10:   3540351515
Pages:   264
Publication Date:   13 June 2006
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Out of print, replaced by POD   Availability explained
We will order this item for you from a manufatured on demand supplier.

Table of Contents

PKI Management.- Use of a Validation Authority to Provide Risk Management for the PKI Relying Party.- Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKI.- Distributing Security-Mediated PKI Revisited.- Authentication I.- An Improved Lu-Cao’s Remote User Authentication Scheme Using Smart Card.- Forward Secure Password-Enabled PKI with Instant Revocation.- Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing.- Cryptography.- Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes.- On the Security of Multilevel Cryptosystems over Class Semigroups of Imaginary Quadratic Non-maximal Orders.- Short Linkable Ring Signatures Revisited.- Applications.- An Infrastructure Supporting Secure Internet Routing.- Fighting E-Mail Abuses: The EMPE Approach.- DomainKeys Identified Mail Demonstrates Good Reasons to Re-invent the Wheel.- Towards Secure Electronic Workflows.- An Access Control System for Multimedia Content Distribution.- Efficient Conjunctive Keyword Search on Encrypted Data Storage System.- Authentication II.- Enhanced Forward-Secure User Authentication Scheme with Smart Cards.- Pseudonymous PKI for Ubiquitous Computing.- An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI.- On the Resilience of Key Agreement Protocols to Key Compromise Impersonation.- Short Contributions.- A PKI System for Detecting the Exposure of a User’s Secret Key.- A Guide to the Nightmares of the Certification Service Provider.- A High-Level 3G Wireless PKI Solution for Secure Healthcare Communications.- Identity-Based Strong Multi-Designated Verifiers Signatures.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List