Public Key Infrastructures, Services and Applications (häftad)
Format
Häftad (Paperback / softback)
Språk
Engelska
Antal sidor
209
Utgivningsdatum
2012-05-22
Upplaga
2012 ed.
Förlag
Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Medarbetare
Petkova-Nikova, Svetla (ed.), Pashalidis, Andreas (ed.), Pernul, Günther (ed.)
Illustrationer
37 Illustrations, black and white; X, 209 p. 37 illus.
Dimensioner
234 x 156 x 12 mm
Vikt
313 g
Antal komponenter
1
Komponenter
1 Paperback / softback
ISBN
9783642298035

Public Key Infrastructures, Services and Applications

8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers

Häftad,  Engelska, 2012-05-22
574
  • Skickas från oss inom 10-15 vardagar.
  • Fri frakt över 249 kr för privatkunder i Sverige.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2011, held in Leuven, Belgium in September 2011 - co-located with the 16th European Symposium on Research in Computer Security, ESORICS 2011. The 10 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 27 submissions. The papers are organized in topical sections on authentication mechanisms, privacy preserving techniques, PKI and secure applications.
Visa hela texten

Passar bra ihop

  1. Public Key Infrastructures, Services and Applications
  2. +
  3. Doppelganger

De som köpt den här boken har ofta också köpt Doppelganger av Naomi Klein (häftad).

Köp båda 2 för 708 kr

Kundrecensioner

Har du läst boken? Sätt ditt betyg »

Fler böcker av författarna

Innehållsförteckning

Authentication Mechanisms.-Secret Handshake Scheme with Request-Based-Revealing .-Password-Based Signatures.-Isolating Partial Information of Indistinguishable Encryptions.-Invited Paper.-A Universal Client-Based Identity Management Tool .-Privacy Preserving Techniques Design and Evaluation of a Privacy-Preserving Architecture for Vehicle-to-Grid Interaction.-Insider Attacks and Privacy of RFID Protocols.-Cell-Based Roadpricing.-Invited Paper.-Ballot Aggregation and Mixnet Based Open-Audit Elections (Extended Abstract).-Invited Paper.-PKI as Part of an Integrated Risk Management Strategy for Web Security.-PKI Applications.-A PKI-Based Mobile Banking Demonstrator.-Certification Validation: Back to the Past.-Secure Applications. A Hijackers Guide to the LPC Bus.-Secure Event Logging in Sensor Networks.-