Public Key Infrastructures, Services and Applications
Springer Berlin (Verlag)
978-3-642-29803-5 (ISBN)
Authentication Mechanisms.-Secret Handshake Scheme with Request-Based-Revealing .-Password-Based Signatures.-Isolating Partial Information of Indistinguishable Encryptions.-Invited Paper.-A Universal Client-Based Identity Management Tool .-Privacy Preserving Techniques Design and Evaluation of a Privacy-Preserving Architecture for Vehicle-to-Grid Interaction.-Insider Attacks and Privacy of RFID Protocols.-Cell-Based Roadpricing.-Invited Paper.-Ballot Aggregation and Mixnet Based Open-Audit Elections (Extended Abstract).-Invited Paper.-PKI as Part of an Integrated Risk Management Strategy for Web Security.-PKI Applications.-A PKI-Based Mobile Banking Demonstrator.-Certification Validation: Back to the Past.-Secure Applications. A Hijacker's Guide to the LPC Bus.-Secure Event Logging in Sensor Networks.-
Erscheint lt. Verlag | 22.5.2012 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | X, 209 p. 37 illus. |
Verlagsort | Berlin |
Sprache | englisch |
Gewicht | 340 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Algorithmen | |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | Algorithm analysis and problem complexity • anonymity • indistinguishable encryptions • provable security • Risk Management • RSA signatures |
ISBN-10 | 3-642-29803-6 / 3642298036 |
ISBN-13 | 978-3-642-29803-5 / 9783642298035 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich