Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers

Author:   Svetla Petkova-Nikova ,  Andreas Pashalidis ,  Günther Pernul
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2012 ed.
Volume:   7163
ISBN:  

9783642298035


Pages:   209
Publication Date:   22 May 2012
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $116.41 Quantity:  
Add to Cart

Share |

Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers


Add your own review!

Overview

This book constitutes the thoroughly refereed post-conference proceedings of the 8th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2011, held in Leuven, Belgium in September 2011 - co-located with the 16th European Symposium on Research in Computer Security, ESORICS 2011. The 10 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 27 submissions. The papers are organized in topical sections on authentication mechanisms, privacy preserving techniques, PKI and secure applications.

Full Product Details

Author:   Svetla Petkova-Nikova ,  Andreas Pashalidis ,  Günther Pernul
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2012 ed.
Volume:   7163
Dimensions:   Width: 15.60cm , Height: 1.10cm , Length: 23.40cm
Weight:   0.454kg
ISBN:  

9783642298035


ISBN 10:   3642298036
Pages:   209
Publication Date:   22 May 2012
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Authentication Mechanisms.-Secret Handshake Scheme with Request-Based-Revealing .-Password-Based Signatures.-Isolating Partial Information of Indistinguishable Encryptions.-Invited Paper.-A Universal Client-Based Identity Management Tool .-Privacy Preserving Techniques Design and Evaluation of a Privacy-Preserving Architecture for Vehicle-to-Grid Interaction.-Insider Attacks and Privacy of RFID Protocols.-Cell-Based Roadpricing.-Invited Paper.-Ballot Aggregation and Mixnet Based Open-Audit Elections (Extended Abstract).-Invited Paper.-PKI as Part of an Integrated Risk Management Strategy for Web Security.-PKI Applications.-A PKI-Based Mobile Banking Demonstrator.-Certification Validation: Back to the Past.-Secure Applications. A Hijacker’s Guide to the LPC Bus.-Secure Event Logging in Sensor Networks.-

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List