Public Key Infrastructure
Springer Berlin (Verlag)
978-3-540-69484-7 (ISBN)
Invited Talk.- New PKI Protocols Using Tamper Resistant Hardware.- Certificates.- Validation Algorithms for a Secure Internet Routing PKI.- Instant Revocation.- Optimized Certificates - A New Proposal for Efficient Electronic Document Signature Validation.- Authentication.- An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model.- Trust-Rated Authentication for Domain-Structured Distributed Systems.- Levels of Assurance and Reauthentication in Federated Environments.- Practice.- Current Status of Japanese Government PKI Systems.- A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System.- Signatures.- Fast Point Decompression for Standard Elliptic Curves.- An Efficient Strong Key-Insulated Signature Scheme and Its Application.- Efficient Generic Forward-Secure Signatures and Proxy Signatures.- Analysis.- Fault Attacks on Public Key Elements: Application to DLP-Based Schemes.- Weaknesses in BankID, a PKI-Substitute Deployed by Norwegian Banks.- Networks.- An Open Mobile Identity Tool: An Architecture for Mobile Identity Management.- PEACHES and Peers.
Erscheint lt. Verlag | 3.6.2008 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | X, 239 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 397 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | adaptive security • Algorithm analysis and problem complexity • algorithms • anonymity • anonymous credentials • authentication • authorization • bilinear pairings • certificate validation • Certification • Cryptanalysis • cryptography • Digital Signatures • Distributed Systems • Dom • e-government • electronic healthcare • Elliptic Curve Cryptography • fault attacks • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Healthcare • Identification • Identity • Identity-based cryptography • internet routing PKI • Interoperability • Intrusion Detection • key leakage • mobile identity • optimized certificates • Peer-to-Peer • PKI • privacy • protocols • Public Key • Public Key Cryptography • Public Key Infrastructure • public key management • public key security • rsa • secure messaging • security • side channel • Smart cards • Trust |
ISBN-10 | 3-540-69484-6 / 3540694846 |
ISBN-13 | 978-3-540-69484-7 / 9783540694847 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich