Public Key Infrastructures, Services and Applications [electronic resource] : 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers / edited by Jan Camenisch, Costas Lambrinoudakis.
Material type: TextSeries: Lecture Notes in Computer Science ; 6711Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011Description: XII, 209 p. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783642226335Subject(s): Computer science | Computer Communication Networks | Data protection | Data encryption (Computer science) | Computer software | Information Systems | Computer Science | Computer Communication Networks | Data Encryption | Management of Computing and Information Systems | Algorithm Analysis and Problem Complexity | Computers and Society | Systems and Data SecurityAdditional physical formats: Printed edition:: No titleDDC classification: 004.6 LOC classification: TK5105.5-5105.9Online resources: Click here to access online In: Springer eBooksSummary: This book constitutes the thoroughly refereed post-conference proceedings of the 7th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2010, held in Athens, Greece, in September 2010. The 14 revised full papers presented together with an invited article were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections on authentication mechanisms; privacy preserving techniques; PKI & PKC applications; electronic signature schemes; identity management.Current library | Home library | Call number | Materials specified | URL | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
IMSc Library | IMSc Library | Link to resource | Available | EBK9787 |
This book constitutes the thoroughly refereed post-conference proceedings of the 7th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2010, held in Athens, Greece, in September 2010. The 14 revised full papers presented together with an invited article were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections on authentication mechanisms; privacy preserving techniques; PKI & PKC applications; electronic signature schemes; identity management.
There are no comments on this title.