Public Key Infrastructures, Services and Applications 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers /

This book constitutes the thoroughly refereed post-conference proceedings of the 9th European Workshop, EuroPKI 2012, held in Pisa, Italy, in September 2012. The 12 revised full papers presented were carefully selected from 30 submissions and cover topics such as Cryptographic Schemas and Protocols,...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Capitani di Vimercati, Sabrina. (Editor), Mitchell, Chris. (Editor)
Format: Electronic
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013.
Series:Lecture Notes in Computer Science, 7868
Subjects:
Online Access:https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-40012-4
LEADER 03047nam a22005655i 4500
001 16235
003 DE-He213
005 20130821030139.0
007 cr nn 008mamaa
008 130808s2013 gw | s |||| 0|eng d
020 # # |a 9783642400124  |9 978-3-642-40012-4 
024 7 # |a 10.1007/978-3-642-40012-4  |2 doi 
050 # 4 |a TK5105.5-5105.9 
072 # 7 |a UKN  |2 bicssc 
072 # 7 |a COM075000  |2 bisacsh 
082 0 4 |a 004.6  |2 23 
100 1 # |a Capitani di Vimercati, Sabrina.  |e editor. 
245 1 0 |a Public Key Infrastructures, Services and Applications  |b 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers /  |c edited by Sabrina Capitani di Vimercati, Chris Mitchell.  |h [electronic resource] : 
264 # 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2013. 
300 # # |a X, 195 p. 30 illus.  |b online resource. 
336 # # |a text  |b txt  |2 rdacontent 
337 # # |a computer  |b c  |2 rdamedia 
338 # # |a online resource  |b cr  |2 rdacarrier 
347 # # |a text file  |b PDF  |2 rda 
490 1 # |a Lecture Notes in Computer Science,  |v 7868  |x 0302-9743 ; 
505 0 # |a Cryptographic Schemas and Protocols -- Efficient Public Key Encryption Admitting Decryption by Sender -- Public Key Infrastructure -- How to Avoid the Breakdown of Public Key Infrastructures Forward Secure Signatures for Certificate Authorities -- Personal PKI for the Smart Device Era -- The Notary Based PKI -- Wireless Authentication and Revocation How to Bootstrap Trust Among Devices in Wireless Environments via EAP-STLS -- Anonymity Revocation through Standard Infrastructures. 
520 # # |a This book constitutes the thoroughly refereed post-conference proceedings of the 9th European Workshop, EuroPKI 2012, held in Pisa, Italy, in September 2012. The 12 revised full papers presented were carefully selected from 30 submissions and cover topics such as Cryptographic Schemas and Protocols, Public Key Infrastructure, Wireless Authentication and Revocation, Certificate and Trusted Computing, and Digital Structures. 
650 # 0 |a Computer science. 
650 # 0 |a Computer Communication Networks. 
650 # 0 |a Data protection. 
650 # 0 |a Data encryption (Computer science). 
650 # 0 |a Computer software. 
650 # 0 |a Information Systems. 
650 1 4 |a Computer Science. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Data Encryption. 
650 2 4 |a Management of Computing and Information Systems. 
650 2 4 |a Algorithm Analysis and Problem Complexity. 
650 2 4 |a Computers and Society. 
650 2 4 |a Systems and Data Security. 
700 1 # |a Mitchell, Chris.  |e editor. 
710 2 # |a SpringerLink (Online service) 
773 0 # |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642400117 
830 # 0 |a Lecture Notes in Computer Science,  |v 7868  |x 0302-9743 ; 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-40012-4 
912 # # |a ZDB-2-SCS 
912 # # |a ZDB-2-LNC 
950 # # |a Computer Science (Springer-11645)