E-Book, Englisch, Band 3093, 386 Seiten, eBook
Katsikas / Gritzalis Public Key Infrastructure
Erscheinungsjahr 2004
ISBN: 978-3-540-25980-0
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings
E-Book, Englisch, Band 3093, 386 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-25980-0
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
to the Belgian EID Card.- The EuroPKI Experience.- CERVANTES – A Certificate Validation Test-Bed.- Flexible and Scalable Public Key Security for SSH.- What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved.- Identity-Based Cryptography in Public Key Management.- Pre-production Methods of a Response to Certificates with the Common Status –Design and Theoretical Evaluation–.- Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures.- A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications.- Using LDAP Directories for Management of PKI Processes.- Recursive Certificate Structures for X.509 Systems.- A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions.- A Practical Approach of X.509 Attribute Certificate Framework as Support to Obtain Privilege Delegation.- TACAR: a Simple and Fast Way for Building Trust among PKIs.- On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments.- A Socially Inspired Reputation Model.- Using EMV Cards for Single Sign-On.- Distributing Security-Mediated PKI.- Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography.- ÆTHER: an Authorization Management Architecture for Ubiquitous Computing.- Trustworthy Accounting for Wireless LAN Sharing Communities.- Mobile Qualified Electronic Signatures and Certification on Demand.- Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks.- A Credential Conversion Service for SAML-based Scenarios.- A New Design of Privilege Management Infrastructure with Binding Signature Semantics.- How to Qualify Electronic Signatures and Time Stamps.- An EfficientRevocation Scheme for Stateless Receivers.- On the Use of Weber Polynomials in Elliptic Curve Cryptography.- Threshold Password-Based Authentication Using Bilinear Pairings.- An Efficient Group Key Management Scheme for Secure Multicast with Multimedia Applications.