公钥基础结构:第3届欧洲研讨会/会议录Public key infrastructure

分类: 图书,计算机/网络,信息安全,
作者: Andrea S. Atzeni 著
出 版 社: 湖北辞书出版社
出版时间: 2007-8-16字数:版次: 1页数: 259印刷时间: 2006/12/01开本:印次:纸张: 胶版纸I S B N : 9783540351511包装: 平装编辑推荐
The LNCS series reports state-of-the-art results in computer science research,development,and education,at a high level and in both printed and electronic form.Enjoying tight cooperation with the R&D community,with numerous individuals,as well as with prestigious organizations and societies,LNCS has grown into the most comprehensive computer science resarch forum available.
The scope of LNCS,including its subseries LNAI,spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields.The type of material publised traditionally includes.
-proceedings(published in time for the respective conference)
-post-proceedings(consisting of thoroughly revised final full papers)
-research monographs(which may be basde on outstanding PhD work,research projects,technical reports,etc.)
内容简介
This book constitutes the refereed proceedings of the Third European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2006, held in Torino, Italy, in June 2006.
The 18 revised full papers and 4 short papers presented were carefully reviewed and selected from about 50 submissions. The papers are organized in topical sections on PKI management, authentication, cryptography, applications, and short contributions.
目录
PKI Management
Use of a Validation Authority to Provide Risk Management for the PKI Relying Party
Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKI
Distributing Security-Mediated PKI Revisited
Authentication I
An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card
Forward Secure Password-Enabled PKI with Instant Revocation
Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing
Cryptography
Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes
On the Security of Multilevel Cryptosystems over Class Semigroups of Imaginary Quadratic Non-maximal Orders
Short Linkable Ring Signatures Revisited
Applications
An Infrastructure Supporting Secure Internet Routing
Fighting E-Mail Abuses: The EMPE Approach
DomainKeys Identified Mail Demonstrates Good Reasons to Re-inventthe Wheel
Towards Secure Electronic Workflows
An Access Control System for Multimedia Content Distribution
Efficient Conjunctive Keyword Search on Encrypted Data StorageSystem
Authentication II
Enhanced Forward-Secure User Authentication Scheme with Smart Cards
Pseudonymous PKI for Ubiquitous Computing
An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Short Contributions
Author Index