Public Key Infrastructure Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006. Proceedings /

Today, PKIs have come of age and they support the security of several large networked systems, such as company-wide document management systems,- governmentapplicationsandsecureVPN.However,despitethissuccess,the?eld has not yet reachedits full scienti?c maturity and there is still room for research...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Atzeni, Andrea S. (Επιμελητής έκδοσης), Lioy, Antonio (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.
Σειρά:Lecture Notes in Computer Science, 4043
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • PKI Management
  • Use of a Validation Authority to Provide Risk Management for the PKI Relying Party
  • Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKI
  • Distributing Security-Mediated PKI Revisited
  • Authentication I
  • An Improved Lu-Cao’s Remote User Authentication Scheme Using Smart Card
  • Forward Secure Password-Enabled PKI with Instant Revocation
  • Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing
  • Cryptography
  • Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes
  • On the Security of Multilevel Cryptosystems over Class Semigroups of Imaginary Quadratic Non-maximal Orders
  • Short Linkable Ring Signatures Revisited
  • Applications
  • An Infrastructure Supporting Secure Internet Routing
  • Fighting E-Mail Abuses: The EMPE Approach
  • DomainKeys Identified Mail Demonstrates Good Reasons to Re-invent the Wheel
  • Towards Secure Electronic Workflows
  • An Access Control System for Multimedia Content Distribution
  • Efficient Conjunctive Keyword Search on Encrypted Data Storage System
  • Authentication II
  • Enhanced Forward-Secure User Authentication Scheme with Smart Cards
  • Pseudonymous PKI for Ubiquitous Computing
  • An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI
  • On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
  • Short Contributions
  • A PKI System for Detecting the Exposure of a User’s Secret Key
  • A Guide to the Nightmares of the Certification Service Provider
  • A High-Level 3G Wireless PKI Solution for Secure Healthcare Communications
  • Identity-Based Strong Multi-Designated Verifiers Signatures.