Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_9948621040102882
    Format: XIV, 386 p. , online resource.
    Edition: 1st ed. 2004.
    ISBN: 9783540259800
    Series Statement: Lecture Notes in Computer Science, 3093
    Content: This book constitutes the refereed proceedings of the First European Public Key Infrastructure Workshop: Research and Applications, EuroPKI 2004, held on Samos Island, Greece in June 2004. The 25 revised full papers and 5 revised short papers presented were carefully reviewed and selected from 73 submissions. The papers address all current issues in PKI, ranging from theoretical and foundational topics to applications and regulatory issues in various contexts.
    Note: to the Belgian EID Card -- The EuroPKI Experience -- CERVANTES - A Certificate Validation Test-Bed -- Flexible and Scalable Public Key Security for SSH -- What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved -- Identity-Based Cryptography in Public Key Management -- Pre-production Methods of a Response to Certificates with the Common Status -Design and Theoretical Evaluation- -- Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures -- A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications -- Using LDAP Directories for Management of PKI Processes -- Recursive Certificate Structures for X.509 Systems -- A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions -- A Practical Approach of X.509 Attribute Certificate Framework as Support to Obtain Privilege Delegation -- TACAR: a Simple and Fast Way for Building Trust among PKIs -- On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments -- A Socially Inspired Reputation Model -- Using EMV Cards for Single Sign-On -- Distributing Security-Mediated PKI -- Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography -- ÆTHER: an Authorization Management Architecture for Ubiquitous Computing -- Trustworthy Accounting for Wireless LAN Sharing Communities -- Mobile Qualified Electronic Signatures and Certification on Demand -- Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks -- A Credential Conversion Service for SAML-based Scenarios -- A New Design of Privilege Management Infrastructure with Binding Signature Semantics -- How to Qualify Electronic Signatures and Time Stamps -- An Efficient Revocation Scheme for Stateless Receivers -- On the Use of Weber Polynomials in Elliptic Curve Cryptography -- Threshold Password-Based Authentication Using Bilinear Pairings -- An Efficient Group Key Management Scheme for Secure Multicast with Multimedia Applications.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783662211403
    Additional Edition: Printed edition: ISBN 9783540222163
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages