000 | 05794nam a22006615i 4500 | ||
---|---|---|---|
001 | 978-3-540-73408-6 | ||
003 | DE-He213 | ||
005 | 20240730200028.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2007 gw | s |||| 0|eng d | ||
020 |
_a9783540734086 _9978-3-540-73408-6 |
||
024 | 7 |
_a10.1007/978-3-540-73408-6 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aPublic Key Infrastructure _h[electronic resource] : _b4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings / _cedited by Pierangela Samarati, Josep L. Ferrer. |
250 | _a1st ed. 2007. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2007. |
|
300 |
_aXI, 380 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v4582 |
|
505 | 0 | _aAuthorization Architectures for Privacy-Respecting Surveillance -- Privacy-Preserving Revocation Checking with Modified CRLs -- E-Passports as a Means Towards the First World-Wide Public Key Infrastructure -- An Interdomain PKI Model Based on Trust Lists -- One-More Extension of Paillier Inversion Problem and Concurrent Secure Identification -- An Efficient Signcryption Scheme with Key Privacy -- Direct Chosen-Ciphertext Secure Hierarchical ID-Based Encryption Schemes -- Certificate-Based Signature: Security Model and Efficient Construction -- Time Capsule Signature: Efficient and Provably Secure Constructions -- A New Variant for an Attack Against RSA Signature Verification Using Parameter Field -- AutoPKI: A PKI Resources Discovery System -- Bootstrapping a Global SSO from Network Access Control Mechanisms -- Anonymous k-Show Credentials -- On Partial Anonymity in Secret Sharing -- Anonymous Identification and Designated-Verifiers Signatures from Insecure Batch Verification -- OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure's Hardware Security Modules -- Two Worlds, One Smart Card: An Integrated Solution for Physical Access and Logical Security Using PKI on a Single Smart Card -- On the Robustness of Applications Based on the SSL and TLS Security Protocols -- Using WebDAV for Improved Certificate Revocation and Publication -- Reducing the Computational Cost of Certification Path Validation in Mobile Payment -- Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code -- Applicability of Public Key Infrastructures in Wireless Sensor Networks -- Spatial-Temporal Certification Framework and Extension of X.509 Attribute Certificate Framework and SAML Standard to Support Spatial-Temporal Certificates -- Electronic Payment Scheme Using Identity-BasedCryptography -- Undeniable Mobile Billing Schemes -- Universally Composable Signcryption -- Chord-PKI: Embedding a Public Key Infrastructure into the Chord Overlay Network -- Privacy Protection in Location-Based Services Through a Public-Key Privacy Homomorphism -- A Critical View on RFC 3647. | |
520 | _aThese proceedings contain the papers accepted at the 2007 European PKI Workshop: Theory and Practice (EuroPKI 2007), held in Palma de Mallorca, Spain, during June 28-30, and hosted by the Computer Science Department of the University of Balearic Islands (UIB) with the support of the Balearic Islands Government and the Private Law Department at UIB. This year's event was the fourth event in the EuroPKI Workshops series. Previous events of the series were held in: Samos, Greece (2004); Kent, UK (2005); and Turin, Italy, (2006). In response to the call for papers, 77 papers were submitted to this year's workshop, setting a record of the highest number of papers submitted to an EuroPKI event so far and confirming an increased interest in PKI research and in the EuroPKI event. Each paper was reviewed by three members of the Program Committee, and evaluated on the basis of its significance, novelty, technical quality and relevance to the workshop. The paper selection process was very competitive: of the papers submitted, only 21 full papers and 8 short papers were selected for presentation at the workshop and inclusion in this volume. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aInformation storage and retrieval systems. _922213 |
|
650 | 0 |
_aApplication software. _9161928 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9161929 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aInformation Storage and Retrieval. _923927 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9161930 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
650 | 2 | 4 |
_aIT Operations. _931703 |
700 | 1 |
_aSamarati, Pierangela. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9161931 |
|
700 | 1 |
_aFerrer, Josep L. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9161932 |
|
710 | 2 |
_aSpringerLink (Online service) _9161933 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540734079 |
776 | 0 | 8 |
_iPrinted edition: _z9783540840367 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v4582 _9161934 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-540-73408-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c95863 _d95863 |