Description |
1 online resource (x, 195 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 7868 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 7868, 0302-9743
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Cryptographic Schemas and Protocols. Analysis of Lattice Reduction Attack against the Somewhat Homomorphic Encryption Based on Ideal Lattices / Masaya Yasuda [and others] -- Group Key Exchange Resilient to Leakage of Ephemeral Secret Keys with Strong Contributiveness / Cheng Chen, Yanfei Guo, Rui Zhang -- Efficient Public Key Encryption Admitting Decryption by Sender / Puwen Wei, Yuliang Zheng -- Public Key Infrastructure. How to Avoid the Breakdown of Public Key Infrastructures / Johannes Braun [and others] -- Personal PKI for the Smart Device Era / John Lyle [and others] -- The Notary Based PKI / Martín A.G. Vigil [and others] -- Wireless Authentication and Revocation. How to Bootstrap Trust among Devices in Wireless Environments via EAP-STLS / Massimiliano Pala -- Anonymity Revocation through Standard Infrastructures / Jesus Diaz, David Arroyo, Francisco B. Rodriguez -- Certificate and Trusted Computing. GeoPKI: Converting Spatial Trust into Certificate Trust / Tiffany Hyun-Jin Kim, Virgil Gligor, Adrian Perrig -- Waltzing the Bear, or: A Trusted Virtual Security Module / Ronald Toegl, Florian Reimair, Martin Pirker -- Digital Signatures. Cross-Unlinkable Hierarchical Group Signatures / Julien Bringer, Hervé Chabanne, Alain Patey -- Non-interactive Public Accountability for Sanitizable Signatures / Christina Brzuska, Henrich C. Pöhls, Kai Samelin |
Summary |
This book constitutes the thoroughly refereed post-conference proceedings of the 9th European Workshop, EuroPKI 2012, held in Pisa, Italy, in September 2012. The 12 revised full papers presented were carefully selected from 30 submissions and cover topics such as Cryptographic Schemas and Protocols, Public Key Infrastructure, Wireless Authentication and Revocation, Certificate and Trusted Computing, and Digital Structures |
Notes |
Includes author index |
Bibliography |
Includes author index |
Notes |
Online resource; title from PDF title page (SpringerLink, viewed August 20, 2013) |
Subject |
Public key infrastructure (Computer security) -- Congresses
|
|
Computer security.
|
|
Government
|
|
Computer Security
|
|
governments (administrative bodies)
|
|
Computer security
|
|
Public key infrastructure (Computer security)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
De Capitani di Vimercati, Sabrina, editor
|
|
Mitchell, Chris (Christopher John), editor.
|
ISBN |
9783642400124 |
|
3642400124 |
|
3642400116 |
|
9783642400117 |
|