书籍详情
公钥基础结构:第3届欧洲研讨会(会议录)
作者:Andrea S. Atzeni 著
出版社:崇文书局(原湖北辞书出版社)
出版时间:2007-08-01
ISBN:9783540351511
定价:¥508.50
购买这本书可以去
内容简介
This book constitutes the refereed proceedings of the Third European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2006, held in Torino, Italy, in June 2006.The 18 revised full papers and 4 short papers presented were carefully reviewed and selected from about 50 submissions. The papers are organized in topical sections on PKI management, authentication, cryptography, applications, and short contributions.
作者简介
暂缺《公钥基础结构:第3届欧洲研讨会(会议录)》作者简介
目录
PKI Management
Use of a Validation Authority to Provide Risk Management for the PKI Relying Party
Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKI
Distributing Security-Mediated PKI Revisited
Authentication I
An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card
Forward Secure Password-Enabled PKI with Instant Revocation
Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing
Cryptography
Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes
On the Security of Multilevel Cryptosystems over Class Semigroups of Imaginary Quadratic Non-maximal Orders
Short Linkable Ring Signatures Revisited
Applications
An Infrastructure Supporting Secure Internet Routing
Fighting E-Mail Abuses: The EMPE Approach
DomainKeys Identified Mail Demonstrates Good Reasons to Re-invent the Wheel
Towards Secure Electronic Workflows
An Access Control System for Multimedia Content Distribution
Efficient Conjunctive Keyword Search on Encrypted Data Storage System
Authentication II
Enhanced Forward-Secure User Authentication Scheme with Smart Cards
Pseudonymous PKI for Ubiquitous Computing
An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Short Contributions
Author Index
Use of a Validation Authority to Provide Risk Management for the PKI Relying Party
Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKI
Distributing Security-Mediated PKI Revisited
Authentication I
An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card
Forward Secure Password-Enabled PKI with Instant Revocation
Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing
Cryptography
Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes
On the Security of Multilevel Cryptosystems over Class Semigroups of Imaginary Quadratic Non-maximal Orders
Short Linkable Ring Signatures Revisited
Applications
An Infrastructure Supporting Secure Internet Routing
Fighting E-Mail Abuses: The EMPE Approach
DomainKeys Identified Mail Demonstrates Good Reasons to Re-invent the Wheel
Towards Secure Electronic Workflows
An Access Control System for Multimedia Content Distribution
Efficient Conjunctive Keyword Search on Encrypted Data Storage System
Authentication II
Enhanced Forward-Secure User Authentication Scheme with Smart Cards
Pseudonymous PKI for Ubiquitous Computing
An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Short Contributions
Author Index
猜您喜欢