|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Andrea S. Atzeni , Antonio LioyPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 2006 ed. Volume: 4043 Dimensions: Width: 15.50cm , Height: 1.40cm , Length: 23.50cm Weight: 0.870kg ISBN: 9783540351511ISBN 10: 3540351515 Pages: 264 Publication Date: 13 June 2006 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Out of print, replaced by POD ![]() We will order this item for you from a manufatured on demand supplier. Table of ContentsPKI Management.- Use of a Validation Authority to Provide Risk Management for the PKI Relying Party.- Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKI.- Distributing Security-Mediated PKI Revisited.- Authentication I.- An Improved Lu-Cao’s Remote User Authentication Scheme Using Smart Card.- Forward Secure Password-Enabled PKI with Instant Revocation.- Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing.- Cryptography.- Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes.- On the Security of Multilevel Cryptosystems over Class Semigroups of Imaginary Quadratic Non-maximal Orders.- Short Linkable Ring Signatures Revisited.- Applications.- An Infrastructure Supporting Secure Internet Routing.- Fighting E-Mail Abuses: The EMPE Approach.- DomainKeys Identified Mail Demonstrates Good Reasons to Re-invent the Wheel.- Towards Secure Electronic Workflows.- An Access Control System for Multimedia Content Distribution.- Efficient Conjunctive Keyword Search on Encrypted Data Storage System.- Authentication II.- Enhanced Forward-Secure User Authentication Scheme with Smart Cards.- Pseudonymous PKI for Ubiquitous Computing.- An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI.- On the Resilience of Key Agreement Protocols to Key Compromise Impersonation.- Short Contributions.- A PKI System for Detecting the Exposure of a User’s Secret Key.- A Guide to the Nightmares of the Certification Service Provider.- A High-Level 3G Wireless PKI Solution for Secure Healthcare Communications.- Identity-Based Strong Multi-Designated Verifiers Signatures.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |