Public Key Infrastructure Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006. Proceedings /
Today, PKIs have come of age and they support the security of several large networked systems, such as company-wide document management systems,- governmentapplicationsandsecureVPN.However,despitethissuccess,the?eld has not yet reachedits full scienti?c maturity and there is still room for research...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2006.
|
Σειρά: | Lecture Notes in Computer Science,
4043 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- PKI Management
- Use of a Validation Authority to Provide Risk Management for the PKI Relying Party
- Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKI
- Distributing Security-Mediated PKI Revisited
- Authentication I
- An Improved Lu-Cao’s Remote User Authentication Scheme Using Smart Card
- Forward Secure Password-Enabled PKI with Instant Revocation
- Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing
- Cryptography
- Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes
- On the Security of Multilevel Cryptosystems over Class Semigroups of Imaginary Quadratic Non-maximal Orders
- Short Linkable Ring Signatures Revisited
- Applications
- An Infrastructure Supporting Secure Internet Routing
- Fighting E-Mail Abuses: The EMPE Approach
- DomainKeys Identified Mail Demonstrates Good Reasons to Re-invent the Wheel
- Towards Secure Electronic Workflows
- An Access Control System for Multimedia Content Distribution
- Efficient Conjunctive Keyword Search on Encrypted Data Storage System
- Authentication II
- Enhanced Forward-Secure User Authentication Scheme with Smart Cards
- Pseudonymous PKI for Ubiquitous Computing
- An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI
- On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
- Short Contributions
- A PKI System for Detecting the Exposure of a User’s Secret Key
- A Guide to the Nightmares of the Certification Service Provider
- A High-Level 3G Wireless PKI Solution for Secure Healthcare Communications
- Identity-Based Strong Multi-Designated Verifiers Signatures.