Public key infrastructure : Third European PKI Workshop : theory and practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006 : proceedings / Andrea S. Atzeni, Antonio Lioy (eds.).

By: (3rd : European PKI Workshop (3rd : 2006 : Turin, Italy)
Contributor(s): Atzeni, Andrea S | Lioy, Antonio, 1958-
Material type: TextTextSeries: SerienbezeichnungLecture notes in computer science: 4043.Publisher: Berlin ; New York : Springer, ©2006Description: 1 online resource (xi, 259 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783540351528; 3540351523; 3540351515; 9783540351511Other title: EuroPKI 2006Subject(s): Public key infrastructure (Computer security) -- Congresses | Public key cryptography -- Congresses | Data encryption (Computer science) -- Congresses | Computer networks -- Security measures -- Congresses | Cryptographie à clé publique -- Congrès | Chiffrement (Informatique) -- Congrès | Infrastructure à clé publique (Sécurité informatique) -- Congrès | Réseaux d'ordinateurs -- Sécurité -- Mesures -- Congrès | COMPUTERS -- Internet -- Security | COMPUTERS -- Networking -- Security | COMPUTERS -- Security -- General | Public key cryptography | Data encryption (Computer science) | Computer networks -- Security measures | Cryptographie à clé publique | Chiffrement (Informatique) | Infrastructure à clé publique (Sécurité informatique) | Réseaux d'ordinateurs -- Sécurité -- Mesures | Public key infrastructure (Computer security) | Informatique | Computer networks -- Security measures | Data encryption (Computer science) | Public key cryptography | Public key infrastructure (Computer security) | algoritmen | algorithms | computeranalyse | computer analysis | computers | samenleving | society | informatieontsluiting | information retrieval | informatieopslag | information storage | informatiesystemen | information systems | internet | computerwetenschappen | computer sciences | gegevensbeheer | data management | Information and Communication Technology (General) | Informatie- en communicatietechnologie (algemeen)Genre/Form: Electronic books. | Conference papers and proceedings. Additional physical formats: Print version:: Public key infrastructure.DDC classification: 005.8 LOC classification: QA76.9.A25 | E973 2006Other classification: TP309-532 Online resources: Click here to access online
Contents:
PKI Management -- Use of a Validation Authority to Provide Risk Management for the PKI Relying Party -- Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKI -- Distributing Security-Mediated PKI Revisited -- Authentication I -- An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card -- Forward Secure Password-Enabled PKI with Instant Revocation -- Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing -- Cryptography -- Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes -- On the Security of Multilevel Cryptosystems over Class Semigroups of Imaginary Quadratic Non-maximal Orders -- Short Linkable Ring Signatures Revisited -- Applications -- An Infrastructure Supporting Secure Internet Routing -- Fighting E-Mail Abuses: The EMPE Approach -- DomainKeys Identified Mail Demonstrates Good Reasons to Re-invent the Wheel -- Towards Secure Electronic Workflows -- An Access Control System for Multimedia Content Distribution -- Efficient Conjunctive Keyword Search on Encrypted Data Storage System -- Authentication II -- Enhanced Forward-Secure User Authentication Scheme with Smart Cards -- Pseudonymous PKI for Ubiquitous Computing -- An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI -- On the Resilience of Key Agreement Protocols to Key Compromise Impersonation -- Short Contributions -- A PKI System for Detecting the Exposure of a User's Secret Key -- A Guide to the Nightmares of the Certification Service Provider -- A High-Level 3G Wireless PKI Solution for Secure Healthcare Communications -- Identity-Based Strong Multi-Designated Verifiers Signatures.
Summary: Today, PKIs have come of age and they support the security of several large networked systems, such as company-wide document management systems, - governmentapplicationsandsecureVPN. However, despitethissuccess, the?eld has not yet reachedits full scienti?c maturity and there is still room for research in this area. For example, open issues exist in the e?cient management of large PKI (especially with respect to certi?cate validation), better performance could be attained by improved cryptographic techniques and innovative applications are continuously proposed. To discuss progress in the PKI?eld, the European PKI workshop series was established in 2004, following similar initiatives in Asia and the USA. The?rst two events of this series took place on the Island of Samos, Greece (EuroPKI 2004), and in Canterbury, UK (EuroPKI 2005). This book contains the proceedings of the Third European PKI Workshop (EuroPKI 2006), held at the Politecnico di Torino, Italy, on June 19-20, 2006. In response to the Call for Papers, about 50 submissions were received. All submissions werereviewed by at least two reviewers(external or members of the Program Committee) and most of them got three reviews. At the end of this process, 22 papers were selected, 18 in their full form and 4 as short papers. These papers led to a lively workshop, with a good mixture between theory and application, continuing the success of the previous workshops in the series.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Includes bibliographical references and index.

Print version record.

Today, PKIs have come of age and they support the security of several large networked systems, such as company-wide document management systems, - governmentapplicationsandsecureVPN. However, despitethissuccess, the?eld has not yet reachedits full scienti?c maturity and there is still room for research in this area. For example, open issues exist in the e?cient management of large PKI (especially with respect to certi?cate validation), better performance could be attained by improved cryptographic techniques and innovative applications are continuously proposed. To discuss progress in the PKI?eld, the European PKI workshop series was established in 2004, following similar initiatives in Asia and the USA. The?rst two events of this series took place on the Island of Samos, Greece (EuroPKI 2004), and in Canterbury, UK (EuroPKI 2005). This book contains the proceedings of the Third European PKI Workshop (EuroPKI 2006), held at the Politecnico di Torino, Italy, on June 19-20, 2006. In response to the Call for Papers, about 50 submissions were received. All submissions werereviewed by at least two reviewers(external or members of the Program Committee) and most of them got three reviews. At the end of this process, 22 papers were selected, 18 in their full form and 4 as short papers. These papers led to a lively workshop, with a good mixture between theory and application, continuing the success of the previous workshops in the series.

PKI Management -- Use of a Validation Authority to Provide Risk Management for the PKI Relying Party -- Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKI -- Distributing Security-Mediated PKI Revisited -- Authentication I -- An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card -- Forward Secure Password-Enabled PKI with Instant Revocation -- Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing -- Cryptography -- Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes -- On the Security of Multilevel Cryptosystems over Class Semigroups of Imaginary Quadratic Non-maximal Orders -- Short Linkable Ring Signatures Revisited -- Applications -- An Infrastructure Supporting Secure Internet Routing -- Fighting E-Mail Abuses: The EMPE Approach -- DomainKeys Identified Mail Demonstrates Good Reasons to Re-invent the Wheel -- Towards Secure Electronic Workflows -- An Access Control System for Multimedia Content Distribution -- Efficient Conjunctive Keyword Search on Encrypted Data Storage System -- Authentication II -- Enhanced Forward-Secure User Authentication Scheme with Smart Cards -- Pseudonymous PKI for Ubiquitous Computing -- An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI -- On the Resilience of Key Agreement Protocols to Key Compromise Impersonation -- Short Contributions -- A PKI System for Detecting the Exposure of a User's Secret Key -- A Guide to the Nightmares of the Certification Service Provider -- A High-Level 3G Wireless PKI Solution for Secure Healthcare Communications -- Identity-Based Strong Multi-Designated Verifiers Signatures.

There are no comments for this item.

to post a comment.

Powered by Koha