Public Key Infrastructures, Services and Applications
Authentication Mechanisms.-Secret Handshake Scheme with Request-Based-Revealing .-Password-Based Signatures.-Isolating Partial Information of Indistinguishable Encryptions.-Invited Paper.-A Universal Client-Based Identity Management Tool .-Privacy Preserving Techniques Design and Evaluation of a Privacy-Preserving Architecture for Vehicle-to-Grid Interaction.-Insider Attacks and Privacy of RFID Protocols.-Cell-Based Roadpricing.-Invited Paper.-Ballot Aggregation and Mixnet Based Open-Audit Elections (Extended Abstract).-Invited Paper.-PKI as Part of an Integrated Risk Management Strategy for Web Security.-PKI Applications.-A PKI-Based Mobile Banking Demonstrator.-Certification Validation: Back to the Past.-Secure Applications. A Hijacker's Guide to the LPC Bus.-Secure Event Logging in Sensor Networks.-
| Erscheint lt. Verlag | 22.5.2012 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | X, 209 p. 37 illus. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Gewicht | 340 g |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Informatik ► Theorie / Studium ► Algorithmen | |
| Informatik ► Theorie / Studium ► Kryptologie | |
| Schlagworte | Algorithm analysis and problem complexity • anonymity • indistinguishable encryptions • provable security • Risk Management • RSA signatures |
| ISBN-13 | 9783642298035 / 9783642298035 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich