Public key infrastructures, services and applications : 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013 : revised selected papers

Author(s)

Bibliographic Information

Public key infrastructures, services and applications : 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013 : revised selected papers

Sokratis Katsikas, Isaac Agudo (eds.)

(Lecture notes in computer science, 8341 . LNCS sublibrary ; SL 4 . Security and cryptology)

Springer, c2014

Other Title

Public key infrastructures, services and applications : 10th European Workshop, EuroPKI 2013, Egham, UK, September 2013 : revised selected papers

Available at  / 1 libraries

Search this Book/Journal

Note

Includes bibliographical references and index

Description and Table of Contents

Description

This book constitutes the thoroughly refereed post-conference proceedings of the 10th European Workshop, EuroPKI 2013, held in Egham, UK, in September 2013. The 11 revised full papers presented together with 1 invited talk were carefully selected from 20 submissions. The papers are organized in topical sections such as authorization and delegation, certificates management, cross certification, interoperability, key management, legal issues, long-time archiving, time stamping, trust management, trusted computing, ubiquitous scenarios and Web services security.

Table of Contents

Partial Model Checking for the Verification and Synthesis of Secure Service Compositions.- Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures.- Revocation and Non-repudiation: When the First Destroys the Latter.- New Results for the Practical Use of Range Proofs.- STUNT: A Simple, Transparent, User-Centered Network of Trust.- What Public Keys Can Do for 3-Party, Password-Authenticated Key Exchange.- Towards a More Secure and Scalable Verifying PKI of eMRTD.- Mutual Restricted Identification.- Trust Views for the Web PKI.- A User-Centric Digital Signature Scheme.- A Test-Bed for Intrusion Detection Systems Results Post-processing.- Uncertainty in Intrusion Detection Signaling Games.

by "Nielsen BookData"

Related Books: 1-1 of 1

Details

Page Top