01088nam0M2200397--I450-99000243814020331620050616131012.088-430-0385-299-536000243814USA01000243814(ALEPH)000243814USA0100024381420050616d1999----||itac0103 baitaIT||||||||001yy<<L'>> età adultateorie dell'identità e pedagogie dello sviluppoDuccio Demetrio4. ristRomaCarocci1999157 p.24 cm.<<Il>> servizio sociale162001<<Il >>servizio sociale162001001-------2001Educazione degli adulti374.001DEMETRIO,Duccio118950ITICCUISBD20040212990002438140203316COLL VI h 163015 DIRCEBKDIRCEDIRCE9020050616USA011310Età adulta749004UNISA00824nam a2200253 i 450099100300100970753620020503181613.0000704s1968 fr ||| | fre b10444178-39ule_instEXGIL113375ExLBiblioteca Interfacoltàita193Châtelet, François376233Hegel /F. ChateletParis :[s.n.],1968192 p.Ecrivains de toujours ;80Hegel, Georg Wilhelm Friedrich.b1044417821-02-1727-06-02991003001009707536LE002 Fil. X N 3312002000534668le002-E0.00-l- 01010.i1051512427-06-02Hegel18757UNISALENTOle00201-01-00ma -frefr 0105869nam 22009015 450 991048327040332120251226195158.01-280-38993-197866135678573-642-16441-210.1007/978-3-642-16441-5(CKB)2550000000019893(SSID)ssj0000446726(PQKBManifestationID)11291915(PQKBTitleCode)TC0000446726(PQKBWorkID)10497904(PQKB)11668454(DE-He213)978-3-642-16441-5(MiAaPQ)EBC3066021(PPN)149029888(BIP)32335424(EXLCZ)99255000000001989320101015d2010 u| 0engurnn#008mamaatxtccrPublic Key Infrastructures, Services and Applications 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers /edited by Fabio Martinelli, Bart Preneel1st ed. 2010.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2010.1 online resource (X, 303 p. 41 illus.)Security and Cryptology,2946-1863 ;6391Bibliographic Level Mode of Issuance: Monograph3-642-16440-4 Includes bibliographical references and index.Certificateless Encryption -- A Brief Introduction to Certificateless Encryption Schemes and Their Infrastructures -- Certificates and Revocation -- A Computational Framework for Certificate Policy Operations -- Resource Management with X.509 Inter-domain Authorization Certificates (InterAC) -- Reducing the Cost of Certificate Revocation: A Case Study -- Cryptographic Protocols -- Automatic Generation of Sigma-Protocols -- A Secure and Efficient Authenticated Diffie–Hellman Protocol -- Key Management for Large-Scale Distributed Storage Systems -- PKI in Practice -- Nationwide PKI Testing – Ensuring Interoperability of OCSP Server and Client Implementations Early during Component Tests -- On Device Identity Establishment and Verification -- ABUSE: PKI for Real-World Email Trust -- Encryption and Auctions -- Public-Key Encryption with Registered Keyword Search -- Practicalization of a Range Test and Its Application to E-Auction -- Timed-Ephemerizer: Make Assured Data Appear and Disappear -- Reputation and User Aspects -- Privacy and Liveliness for Reputation Systems -- A Multidimensional Reputation Scheme for Identity Federations -- On the Usability of User Interfaces for Secure Website Authentication in Browsers -- Digital Signatures -- Validity Models of Electronic Signatures and Their Enforcement in Practice -- Biometric Identity Based Signature Revisited -- How to Construct Identity-Based Signatures without the Key Escrow Problem.Thisbookcontainsthepostproceedingsofthe6thEuropeanWorkshoponPublic Key Services, Applications and Infrastructures, which was held at the CNR Research Area in Pisa, Italy, in September 2009. The EuroPKI workshop series focuses on all research and practice aspects of public key infrastructures, services and applications, and welcomes original research papers and excellent survey contributions from academia, government, and industry. Previous events of the series were held in: Samos, Greece (2004); Kent, UK (2005); Turin, Italy, (2006); Palma de Mallorca, Spain, (2007); and Trondheim, Norway (2008). From the original focus on public key infrastructures, EuroPKI interests - panded to include advanced cryptographic techniques, applications and (more generally) services. The Workshops brings together researchersfrom the cryp- graphiccommunity as well as fromthe applied security community, as witnessed by the interesting program. Indeed, this volume holds 18 refereed papers and the presentation paper by the invited speaker, Alexander Dent. In response to the EuroPKI 2009 call for papers, a total of 40 submissions were received. All submissions underwent a thorough blind review by at least three ProgramCommittee members, resulting in careful selection and revision of the accepted papers. After the conference, the papers were revised and improved by the authors before inclusion in this volume.Security and Cryptology,2946-1863 ;6391Computer networksUser interfaces (Computer systems)Human-computer interactionCryptographyData encryption (Computer science)Electronic data processingManagementAlgorithmsComputers and civilizationComputer Communication NetworksUser Interfaces and Human Computer InteractionCryptologyIT OperationsAlgorithmsComputers and SocietyComputer networks.User interfaces (Computer systems).Human-computer interaction.Cryptography.Data encryption (Computer science).Electronic data processingManagement.Algorithms.Computers and civilization.Computer Communication Networks.User Interfaces and Human Computer Interaction.Cryptology.IT Operations.Algorithms.Computers and Society.005.8Martinelli Fabio600345Preneel Bart28507European PKI Workshop.MiAaPQMiAaPQMiAaPQBOOK9910483270403321Public key infrastructures, services and applications4198446UNINA