Public Key Infrastructure
Springer Berlin (Verlag)
978-3-540-22216-3 (ISBN)
This book constitutes the refereed proceedings of the First European Public Key Infrastructure Workshop: Research and Applications, EuroPKI 2004, held on Samos Island, Greece in June 2004.
The 25 revised full papers and 5 revised short papers presented were carefully reviewed and selected from 73 submissions. The papers address all current issues in PKI, ranging from theoretical and foundational topics to applications and regulatory issues in various contexts.
to the Belgian EID Card.- The EuroPKI Experience.- CERVANTES - A Certificate Validation Test-Bed.- Flexible and Scalable Public Key Security for SSH.- What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved.- Identity-Based Cryptography in Public Key Management.- Pre-production Methods of a Response to Certificates with the Common Status -Design and Theoretical Evaluation-.- Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures.- A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications.- Using LDAP Directories for Management of PKI Processes.- Recursive Certificate Structures for X.509 Systems.- A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions.- A Practical Approach of X.509 Attribute Certificate Framework as Support to Obtain Privilege Delegation.- TACAR: a Simple and Fast Way for Building Trust among PKIs.- On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments.- A Socially Inspired Reputation Model.- Using EMV Cards for Single Sign-On.- Distributing Security-Mediated PKI.- Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography.- ÆTHER: an Authorization Management Architecture for Ubiquitous Computing.- Trustworthy Accounting for Wireless LAN Sharing Communities.- Mobile Qualified Electronic Signatures and Certification on Demand.- Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks.- A Credential Conversion Service for SAML-based Scenarios.- A New Design of Privilege Management Infrastructure with Binding Signature Semantics.- How to Qualify Electronic Signatures and Time Stamps.- An EfficientRevocation Scheme for Stateless Receivers.- On the Use of Weber Polynomials in Elliptic Curve Cryptography.- Threshold Password-Based Authentication Using Bilinear Pairings.- An Efficient Group Key Management Scheme for Secure Multicast with Multimedia Applications.
Erscheint lt. Verlag | 14.6.2004 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XIV, 386 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 600 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • Architecture • authentication • Certification • cryptography • Digital Signatures • electronic time stamps • group key management • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Identity • LA • PKI • PKI (Public Key Infrastructure) • Public Key Cryptography • Public Key Infrastructure • public key management • public key security • rsa • security • SIGNATUR • Trust • trust management • ubiquitous computing • x.509 |
ISBN-10 | 3-540-22216-2 / 3540222162 |
ISBN-13 | 978-3-540-22216-3 / 9783540222163 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich