注冊(cè) | 登錄讀書(shū)好,好讀書(shū),讀好書(shū)!
讀書(shū)網(wǎng)-DuShu.com
當(dāng)前位置: 首頁(yè)出版圖書(shū)科學(xué)技術(shù)計(jì)算機(jī)/網(wǎng)絡(luò)信息安全公鑰基礎(chǔ)結(jié)構(gòu):第3屆歐洲研討會(huì)(會(huì)議錄)

公鑰基礎(chǔ)結(jié)構(gòu):第3屆歐洲研討會(huì)(會(huì)議錄)

公鑰基礎(chǔ)結(jié)構(gòu):第3屆歐洲研討會(huì)(會(huì)議錄)

定 價(jià):¥508.50

作 者: Andrea S. Atzeni 著
出版社: 崇文書(shū)局(原湖北辭書(shū)出版社)
叢編項(xiàng):
標(biāo) 簽: 暫缺

購(gòu)買(mǎi)這本書(shū)可以去


ISBN: 9783540351511 出版時(shí)間: 2007-08-01 包裝: 平裝
開(kāi)本: 頁(yè)數(shù): 字?jǐn)?shù):  

內(nèi)容簡(jiǎn)介

  This book constitutes the refereed proceedings of the Third European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2006, held in Torino, Italy, in June 2006.The 18 revised full papers and 4 short papers presented were carefully reviewed and selected from about 50 submissions. The papers are organized in topical sections on PKI management, authentication, cryptography, applications, and short contributions.

作者簡(jiǎn)介

暫缺《公鑰基礎(chǔ)結(jié)構(gòu):第3屆歐洲研討會(huì)(會(huì)議錄)》作者簡(jiǎn)介

圖書(shū)目錄

PKI Management
 Use of a Validation Authority to Provide Risk Management for the PKI Relying Party
 Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKI
 Distributing Security-Mediated PKI Revisited
Authentication I
 An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card
 Forward Secure Password-Enabled PKI with Instant Revocation
 Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing
Cryptography
 Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes
 On the Security of Multilevel Cryptosystems over Class Semigroups of Imaginary Quadratic Non-maximal Orders
 Short Linkable Ring Signatures Revisited
Applications
 An Infrastructure Supporting Secure Internet Routing
 Fighting E-Mail Abuses: The EMPE Approach
 DomainKeys Identified Mail Demonstrates Good Reasons to Re-invent the Wheel
 Towards Secure Electronic Workflows
 An Access Control System for Multimedia Content Distribution
 Efficient Conjunctive Keyword Search on Encrypted Data Storage System
Authentication II
 Enhanced Forward-Secure User Authentication Scheme with Smart Cards
 Pseudonymous PKI for Ubiquitous Computing
 An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI
 On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Short Contributions
Author Index

本目錄推薦

掃描二維碼
Copyright ? 讀書(shū)網(wǎng) m.ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號(hào) 鄂公網(wǎng)安備 42010302001612號(hào)