LEADER 03647nam 22008175 450 001 9910483163603321 005 20251113181106.0 010 $a3-642-40012-4 024 7 $a10.1007/978-3-642-40012-4 035 $a(CKB)3710000000015888 035 $a(SSID)ssj0000988257 035 $a(PQKBManifestationID)11529008 035 $a(PQKBTitleCode)TC0000988257 035 $a(PQKBWorkID)10951397 035 $a(PQKB)11782231 035 $a(DE-He213)978-3-642-40012-4 035 $a(MiAaPQ)EBC3093259 035 $a(PPN)17242884X 035 $a(EXLCZ)993710000000015888 100 $a20130808d2013 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aPublic Key Infrastructures, Services and Applications $e9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers /$fedited by Sabrina De Capitani di Vimercati, Chris Mitchell 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (X, 195 p. 30 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v7868 300 $aIncludes index. 311 08$a3-642-40011-6 327 $aCryptographic Schemas and Protocols -- Efficient Public Key Encryption Admitting Decryption by Sender -- Public Key Infrastructure -- How to Avoid the Breakdown of Public Key Infrastructures Forward Secure Signatures for Certificate Authorities -- Personal PKI for the Smart Device Era -- The Notary Based PKI -- Wireless Authentication and Revocation How to Bootstrap Trust Among Devices in Wireless Environments via EAP-STLS -- Anonymity Revocation through Standard Infrastructures. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 9th European Workshop, EuroPKI 2012, held in Pisa, Italy, in September 2012. The 12 revised full papers presented were carefully selected from 30 submissions and cover topics such as Cryptographic Schemas and Protocols, Public Key Infrastructure, Wireless Authentication and Revocation, Certificate and Trusted Computing, and Digital Structures. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v7868 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic data processing$xManagement 606 $aAlgorithms 606 $aComputers and civilization 606 $aData protection 606 $aComputer Communication Networks 606 $aCryptology 606 $aIT Operations 606 $aAlgorithms 606 $aComputers and Society 606 $aData and Information Security 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aElectronic data processing$xManagement. 615 0$aAlgorithms. 615 0$aComputers and civilization. 615 0$aData protection. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aIT Operations. 615 24$aAlgorithms. 615 24$aComputers and Society. 615 24$aData and Information Security. 676 $a005.8 702 $aDe Capitani di Vimercati$b Sabrina$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMitchell$b Chris$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483163603321 996 $aPublic Key Infrastructures, Services and Applications$92830108 997 $aUNINA