Public Key Infrastructure
Invited Talk.- New PKI Protocols Using Tamper Resistant Hardware.- Certificates.- Validation Algorithms for a Secure Internet Routing PKI.- Instant Revocation.- Optimized Certificates - A New Proposal for Efficient Electronic Document Signature Validation.- Authentication.- An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model.- Trust-Rated Authentication for Domain-Structured Distributed Systems.- Levels of Assurance and Reauthentication in Federated Environments.- Practice.- Current Status of Japanese Government PKI Systems.- A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System.- Signatures.- Fast Point Decompression for Standard Elliptic Curves.- An Efficient Strong Key-Insulated Signature Scheme and Its Application.- Efficient Generic Forward-Secure Signatures and Proxy Signatures.- Analysis.- Fault Attacks on Public Key Elements: Application to DLP-Based Schemes.- Weaknesses in BankID, a PKI-Substitute Deployed by Norwegian Banks.- Networks.- An Open Mobile Identity Tool: An Architecture for Mobile Identity Management.- PEACHES and Peers.
| Erscheint lt. Verlag | 3.6.2008 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | X, 239 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 397 g |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | adaptive security • Algorithm analysis and problem complexity • algorithms • anonymity • anonymous credentials • authentication • authorization • bilinear pairings • certificate validation • Certification • Cryptanalysis • cryptography • Digital Signatures • Distributed Systems • Dom • e-government • electronic healthcare • Elliptic Curve Cryptography • fault attacks • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Healthcare • Identification • Identity • Identity-based cryptography • internet routing PKI • Interoperability • Intrusion Detection • key leakage • mobile identity • optimized certificates • Peer-to-Peer • PKI • privacy • protocols • Public Key • Public Key Cryptography • Public Key Infrastructure • public key management • public key security • rsa • secure messaging • security • side channel • Smart cards • Trust |
| ISBN-13 | 9783540694847 / 9783540694847 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich