Public Key Infrastructures, Services and Applications 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers /

Public Key Infrastructures, Services and Applications 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers / [electronic resource] : edited by Fabio Martinelli, Bart Preneel. - 1st ed. 2010. - X, 303 p. 41 illus. online resource. - Security and Cryptology, 6391 2946-1863 ; . - Security and Cryptology, 6391 .

Certificateless Encryption -- A Brief Introduction to Certificateless Encryption Schemes and Their Infrastructures -- Certificates and Revocation -- A Computational Framework for Certificate Policy Operations -- Resource Management with X.509 Inter-domain Authorization Certificates (InterAC) -- Reducing the Cost of Certificate Revocation: A Case Study -- Cryptographic Protocols -- Automatic Generation of Sigma-Protocols -- A Secure and Efficient Authenticated Diffie–Hellman Protocol -- Key Management for Large-Scale Distributed Storage Systems -- PKI in Practice -- Nationwide PKI Testing – Ensuring Interoperability of OCSP Server and Client Implementations Early during Component Tests -- On Device Identity Establishment and Verification -- ABUSE: PKI for Real-World Email Trust -- Encryption and Auctions -- Public-Key Encryption with Registered Keyword Search -- Practicalization of a Range Test and Its Application to E-Auction -- Timed-Ephemerizer: Make Assured Data Appear and Disappear -- Reputation and User Aspects -- Privacy and Liveliness for Reputation Systems -- A Multidimensional Reputation Scheme for Identity Federations -- On the Usability of User Interfaces for Secure Website Authentication in Browsers -- Digital Signatures -- Validity Models of Electronic Signatures and Their Enforcement in Practice -- Biometric Identity Based Signature Revisited -- How to Construct Identity-Based Signatures without the Key Escrow Problem.

9783642164415

10.1007/978-3-642-16441-5 doi


Computer networks .
User interfaces (Computer systems).
Human-computer interaction.
Cryptography.
Data encryption (Computer science).
Electronic data processing--Management.
Algorithms.
Computers and civilization.
Computer Communication Networks.
User Interfaces and Human Computer Interaction.
Cryptology.
IT Operations.
Algorithms.
Computers and Society.

TK5105.5-5105.9

004.6
© 2024 IIIT-Delhi, library@iiitd.ac.in