This book constitutes the thoroughly refereed post-conference proceedings of the 10th European Workshop, EuroPKI 2013, held in Egham, UK, in September 2013. The 11 revised full papers presented together with 1 invited talk were carefully selected from 20 submissions. The papers are organized in topical sections such as authorization and delegation, certificates management, cross certification, interoperability, key management, legal issues, long-time archiving, time stamping, trust management, trusted computing, ubiquitous scenarios and Web services security.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th European Workshop, EuroPKI 2013, held in Egham, UK, in September 2013. The 11 revised full papers presented together with 1 invited talk were carefully selected from 20 submissions. The papers are organized in topical sections such as authorization and delegation, certificates management, cross certification, interoperability, key management, legal issues, long-time archiving, time stamping, trust management, trusted computing, ubiquitous scenarios and Web services security.
Partial Model Checking for the Verification and Synthesis of Secure Service Compositions.- Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures.- Revocation and Non-repudiation: When the First Destroys the Latter.- New Results for the Practical Use of Range Proofs.- STUNT: A Simple, Transparent, User-Centered Network of Trust.- What Public Keys Can Do for 3-Party, Password-Authenticated Key Exchange.- Towards a More Secure and Scalable Verifying PKI of eMRTD.- Mutual Restricted Identification.- Trust Views for the Web PKI.- A User-Centric Digital Signature Scheme.- A Test-Bed for Intrusion Detection Systems Results Post-processing.- Uncertainty in Intrusion Detection Signaling Games.
Partial Model Checking for the Verification and Synthesis of Secure Service Compositions.- Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures.- Revocation and Non-repudiation: When the First Destroys the Latter.- New Results for the Practical Use of Range Proofs.- STUNT: A Simple, Transparent, User-Centered Network of Trust.- What Public Keys Can Do for 3-Party, Password-Authenticated Key Exchange.- Towards a More Secure and Scalable Verifying PKI of eMRTD.- Mutual Restricted Identification.- Trust Views for the Web PKI.- A User-Centric Digital Signature Scheme.- A Test-Bed for Intrusion Detection Systems Results Post-processing.- Uncertainty in Intrusion Detection Signaling Games.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826