| ISBN | 出版时间 | 包装 | 开本 | 页数 | 字数 |
|---|---|---|---|---|---|
| 未知 | 暂无 | 暂无 | 未知 | 0 | 暂无 |
PKI Management
Use of a Validation Authority to Provide Risk Management for the PKI Relying Party
Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKI
Distributing Security-Mediated PKI Revisited
Authentication I
An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card
Forward Secure Password-Enabled PKI with Instant Revocation
Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing
Cryptography
Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes
On the Security of Multilevel Cryptosystems over Class Semigroups of Imaginary Quadratic Non-maximal Orders
Short Linkable Ring Signatures Revisited
Applications
An Infrastructure Supporting Secure Internet Routing
Fighting E-Mail Abuses: The EMPE Approach
DomainKeys Identified Mail Demonstrates Good Reasons to Re-invent the Wheel
Towards Secure Electronic Workflows
An Access Control System for Multimedia Content Distribution
Efficient Conjunctive Keyword Search on Encrypted Data Storage System
Authentication II
Enhanced Forward-Secure User Authentication Scheme with Smart Cards
Pseudonymous PKI for Ubiquitous Computing
An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Short Contributions
Author Index