日韩精品 中文字幕 动漫,91亚洲午夜一区,在线不卡日本v一区v二区丶,久久九九国产精品自在现拍

注冊 | 登錄讀書好,好讀書,讀好書!
讀書網(wǎng)-DuShu.com
當(dāng)前位置: 首頁出版圖書科學(xué)技術(shù)計算機(jī)/網(wǎng)絡(luò)信息安全公鑰基礎(chǔ)結(jié)構(gòu):第3屆歐洲研討會(會議錄)

公鑰基礎(chǔ)結(jié)構(gòu):第3屆歐洲研討會(會議錄)

公鑰基礎(chǔ)結(jié)構(gòu):第3屆歐洲研討會(會議錄)

定 價:¥508.50

作 者: Andrea S. Atzeni 著
出版社: 崇文書局(原湖北辭書出版社)
叢編項(xiàng):
標(biāo) 簽: 暫缺

ISBN: 9783540351511 出版時間: 2007-08-01 包裝: 平裝
開本: 頁數(shù): 字?jǐn)?shù):  

內(nèi)容簡介

  This book constitutes the refereed proceedings of the Third European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2006, held in Torino, Italy, in June 2006.The 18 revised full papers and 4 short papers presented were carefully reviewed and selected from about 50 submissions. The papers are organized in topical sections on PKI management, authentication, cryptography, applications, and short contributions.

作者簡介

暫缺《公鑰基礎(chǔ)結(jié)構(gòu):第3屆歐洲研討會(會議錄)》作者簡介

圖書目錄

PKI Management
 Use of a Validation Authority to Provide Risk Management for the PKI Relying Party
 Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKI
 Distributing Security-Mediated PKI Revisited
Authentication I
 An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card
 Forward Secure Password-Enabled PKI with Instant Revocation
 Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing
Cryptography
 Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes
 On the Security of Multilevel Cryptosystems over Class Semigroups of Imaginary Quadratic Non-maximal Orders
 Short Linkable Ring Signatures Revisited
Applications
 An Infrastructure Supporting Secure Internet Routing
 Fighting E-Mail Abuses: The EMPE Approach
 DomainKeys Identified Mail Demonstrates Good Reasons to Re-invent the Wheel
 Towards Secure Electronic Workflows
 An Access Control System for Multimedia Content Distribution
 Efficient Conjunctive Keyword Search on Encrypted Data Storage System
Authentication II
 Enhanced Forward-Secure User Authentication Scheme with Smart Cards
 Pseudonymous PKI for Ubiquitous Computing
 An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI
 On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Short Contributions
Author Index

本目錄推薦

掃描二維碼
Copyright ? 讀書網(wǎng) rgspecialties.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號 鄂公網(wǎng)安備 42010302001612號