Bültmann & Gerriets
Public Key Infrastructures, Services and Applications
8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers
von Svetla Petkova-Nikova, Andreas Pashalidis, Günther Pernul
Verlag: Springer Berlin Heidelberg
Reihe: Lecture Notes in Computer Science Nr. 7163
Reihe: Security and Cryptology
E-Book / PDF
Kopierschutz: PDF mit Wasserzeichen

Hinweis: Nach dem Checkout (Kasse) wird direkt ein Link zum Download bereitgestellt. Der Link kann dann auf PC, Smartphone oder E-Book-Reader ausgeführt werden.
E-Books können per PayPal bezahlt werden. Wenn Sie E-Books per Rechnung bezahlen möchten, kontaktieren Sie uns bitte.

ISBN: 978-3-642-29804-2
Auflage: 2012
Erschienen am 12.05.2012
Sprache: Englisch
Umfang: 209 Seiten

Preis: 53,49 €

53,49 €
merken
zum Hardcover 53,49 €
Inhaltsverzeichnis
Klappentext

Authentication Mechanisms.-Secret Handshake Scheme with Request-Based-Revealing .-Password-Based Signatures.-Isolating Partial Information of Indistinguishable Encryptions.-Invited Paper.-A Universal Client-Based Identity Management Tool .-Privacy Preserving Techniques Design and Evaluation of a Privacy-Preserving Architecture for Vehicle-to-Grid Interaction.-Insider Attacks and Privacy of RFID Protocols.-Cell-Based Roadpricing.-Invited Paper.-Ballot Aggregation and Mixnet Based Open-Audit Elections (Extended Abstract).-Invited Paper.-PKI as Part of an Integrated Risk Management Strategy for Web Security.-PKI Applications.-A PKI-Based Mobile Banking Demonstrator.-Certification Validation: Back to the Past.-Secure Applications. A Hijacker's Guide to the LPC Bus.-Secure Event Logging in Sensor Networks.-



This book constitutes the thoroughly refereed post-conference proceedings of the 8th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2011, held in Leuven, Belgium in September 2011 - co-located with the 16th European Symposium on Research in Computer Security, ESORICS 2011.
The 10 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 27 submissions. The papers are organized in topical sections on authentication mechanisms, privacy preserving techniques, PKI and secure applications.


andere Formate
weitere Titel der Reihe