et al, J. Zhou9781586035501, 1-58603-550-9
Table of contents :
Title page……Page 2
Preface……Page 6
Program Committee……Page 7
Contents……Page 10
PKI Operation & Case Study……Page 12
PKI Challenges: An Industry Analysis……Page 14
Directory Based Registration in Public Key Infrastructures……Page 28
On Automatically Detecting Malicious Imposter Emails……Page 44
Non-Repudiation……Page 60
Generic Fair Non-Repudiation Protocols with Transparent Off-Line TTP……Page 62
Efficient Authorization in Delegation Chains with Strong Non-Repudiation……Page 77
No Author-Based Selective Receipt in Certified Email with Tight Trust Requirements……Page 89
Authorization & Access Control……Page 104
A Generic Protocol for Controlling Access to Mobile Services……Page 106
Use of XACML Policies for a Network Access Control Service……Page 122
A Delegation Logic Based Authorization Mechanism for Virtual Organizations……Page 134
Authentication & Time-Stamping……Page 148
An Efficient and Flexible Scheme to Support Biometric-Based and Role-Based Access Control……Page 150
A Study on a Framework of Online Biometric Authentication with Verification of Personal Repository……Page 166
On Universal Composable Security of Time-Stamping Protocols……Page 180
Certificate Validation & Revocation……Page 194
Augmented CRL Scheme……Page 196
Speeding up X.509 Certificate Path Validation……Page 208
A Lightweight Delegated Privileges Revocation Scheme Based on Coding……Page 218
Cryptographic Applications……Page 234
Hiding Data Sources in P2P Networks……Page 236
Efficient Broadcast from Trapdoor Functions……Page 251
A Generic Scheme for Zero-Knowledge Sets……Page 260
Author Index……Page 276
Reviews
There are no reviews yet.