• Medientyp: E-Book; Konferenzbericht
  • Titel: Public Key Infrastructures, Services and Applications : 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers
  • Enthält: Partial Model Checking for the Verification and Synthesis of Secure Service CompositionsEfficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures -- Revocation and Non-repudiation: When the First Destroys the Latter -- New Results for the Practical Use of Range Proofs -- STUNT: A Simple, Transparent, User-Centered Network of Trust -- What Public Keys Can Do for 3-Party, Password-Authenticated Key Exchange -- Towards a More Secure and Scalable Verifying PKI of eMRTD -- Mutual Restricted Identification -- Trust Views for the Web PKI -- A User-Centric Digital Signature Scheme -- A Test-Bed for Intrusion Detection Systems Results Post-processing -- Uncertainty in Intrusion Detection Signaling Games.
  • Beteiligte: Katsikas, Sokratis [VerfasserIn]; Agudo, Isaac [Hrsg.]
  • Erschienen: Berlin, Heidelberg: Springer, 2014
  • Erschienen in: Lecture notes in computer science ; 8341
    Bücher
  • Umfang: Online-Ressource (X, 205 p. 27 illus, online resource)
  • Sprache: Englisch
  • DOI: 10.1007/978-3-642-53997-8
  • ISBN: 9783642539978
  • Identifikator:
  • RVK-Notation: SS 4800 : Lecture notes in computer science
  • Schlagwörter: Public-Key-Infrastruktur > Trusted Computing
  • Entstehung:
  • Anmerkungen: Literaturangaben
  • Beschreibung: This book constitutes the thoroughly refereed post-conference proceedings of the 10th European Workshop, EuroPKI 2013, held in Egham, UK, in September 2013. The 11 revised full papers presented together with 1 invited talk were carefully selected from 20 submissions. The papers are organized in topical sections such as authorization and delegation, certificates management, cross certification, interoperability, key management, legal issues, long-time archiving, timestamping, trust management, trusted computing, ubiquitous scenarios, and Web services security