Public Key Infrastructures, Services and Applications [electronic resource] :10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers /
Contributor(s): Katsikas, Sokratis [editor.] | Agudo, Isaac [editor.] | SpringerLink (Online service).Material type: BookSeries: Lecture Notes in Computer Science: 8341Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2014.Description: X, 205 p. 27 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642539978.Subject(s): Computer science | Computer communication systems | Computer security | Data encryption (Computer science) | Algorithms | Computers and civilization | Management information systems | Computer Science | Computer Communication Networks | Data Encryption | Management of Computing and Information Systems | Algorithm Analysis and Problem Complexity | Computers and Society | Systems and Data SecurityOnline resources: Click here to access online
Partial Model Checking for the Verification and Synthesis of Secure Service Compositions -- Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures -- Revocation and Non-repudiation: When the First Destroys the Latter -- New Results for the Practical Use of Range Proofs -- STUNT: A Simple, Transparent, User-Centered Network of Trust -- What Public Keys Can Do for 3-Party, Password-Authenticated Key Exchange -- Towards a More Secure and Scalable Verifying PKI of eMRTD -- Mutual Restricted Identification -- Trust Views for the Web PKI -- A User-Centric Digital Signature Scheme -- A Test-Bed for Intrusion Detection Systems Results Post-processing -- Uncertainty in Intrusion Detection Signaling Games.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th European Workshop, EuroPKI 2013, held in Egham, UK, in September 2013. The 11 revised full papers presented together with 1 invited talk were carefully selected from 20 submissions. The papers are organized in topical sections such as authorization and delegation, certificates management, cross certification, interoperability, key management, legal issues, long-time archiving, timestamping, trust management, trusted computing, ubiquitous scenarios, and Web services security.