注册 | 登录读书好,好读书,读好书!
读书网-DuShu.com
当前位置: 首页出版图书科学技术计算机/网络信息安全公钥基础结构:第3届欧洲研讨会(会议录)

公钥基础结构:第3届欧洲研讨会(会议录)

公钥基础结构:第3届欧洲研讨会(会议录)

定 价:¥508.50

作 者: Andrea S. Atzeni 著
出版社: 崇文书局(原湖北辞书出版社)
丛编项:
标 签: 暂缺

购买这本书可以去


ISBN: 9783540351511 出版时间: 2007-08-01 包装: 平装
开本: 页数: 字数:  

内容简介

  This book constitutes the refereed proceedings of the Third European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2006, held in Torino, Italy, in June 2006.The 18 revised full papers and 4 short papers presented were carefully reviewed and selected from about 50 submissions. The papers are organized in topical sections on PKI management, authentication, cryptography, applications, and short contributions.

作者简介

暂缺《公钥基础结构:第3届欧洲研讨会(会议录)》作者简介

图书目录

PKI Management
 Use of a Validation Authority to Provide Risk Management for the PKI Relying Party
 Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKI
 Distributing Security-Mediated PKI Revisited
Authentication I
 An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card
 Forward Secure Password-Enabled PKI with Instant Revocation
 Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing
Cryptography
 Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes
 On the Security of Multilevel Cryptosystems over Class Semigroups of Imaginary Quadratic Non-maximal Orders
 Short Linkable Ring Signatures Revisited
Applications
 An Infrastructure Supporting Secure Internet Routing
 Fighting E-Mail Abuses: The EMPE Approach
 DomainKeys Identified Mail Demonstrates Good Reasons to Re-invent the Wheel
 Towards Secure Electronic Workflows
 An Access Control System for Multimedia Content Distribution
 Efficient Conjunctive Keyword Search on Encrypted Data Storage System
Authentication II
 Enhanced Forward-Secure User Authentication Scheme with Smart Cards
 Pseudonymous PKI for Ubiquitous Computing
 An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI
 On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Short Contributions
Author Index

本目录推荐