Muutke küpsiste eelistusi

Public Key Infrastructures, Services and Applications: 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers 2014 ed. [Pehme köide]

Edited by , Edited by
  • Formaat: Paperback / softback, 205 pages, kõrgus x laius: 235x155 mm, kaal: 3343 g, 27 Illustrations, black and white; X, 205 p. 27 illus., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 8341
  • Ilmumisaeg: 21-Jan-2014
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642539963
  • ISBN-13: 9783642539961
  • Pehme köide
  • Hind: 45,00 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 52,94 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 205 pages, kõrgus x laius: 235x155 mm, kaal: 3343 g, 27 Illustrations, black and white; X, 205 p. 27 illus., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 8341
  • Ilmumisaeg: 21-Jan-2014
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642539963
  • ISBN-13: 9783642539961
This book constitutes the thoroughly refereed post-conference proceedings of the 10th European Workshop, EuroPKI 2013, held in Egham, UK, in September 2013. The 11 revised full papers presented together with 1 invited talk were carefully selected from 20 submissions. The papers are organized in topical sections such as authorization and delegation, certificates management, cross certification, interoperability, key management, legal issues, long-time archiving, time stamping, trust management, trusted computing, ubiquitous scenarios and Web services security.
Partial Model Checking for the Verification and Synthesis of Secure Service Compositions.- Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures.- Revocation and Non-repudiation: When the First Destroys the Latter.- New Results for the Practical Use of Range Proofs.- STUNT: A Simple, Transparent, User-Centered Network of Trust.- What Public Keys Can Do for 3-Party, Password-Authenticated Key Exchange.- Towards a More Secure and Scalable Verifying PKI of eMRTD.- Mutual Restricted Identification.- Trust Views for the Web PKI.- A User-Centric Digital Signature Scheme.- A Test-Bed for Intrusion Detection Systems Results Post-processing.- Uncertainty in Intrusion Detection Signaling Games.