Normal view MARC view ISBD view

Public Key Infrastructures, Services and Applications [electronic resource] : 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers / edited by Jan Camenisch, Costas Lambrinoudakis.

Contributor(s): Camenisch, Jan [editor.] | Lambrinoudakis, Costas [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 6711Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011Edition: 1st ed. 2011.Description: XII, 209 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642226335.Subject(s): Computer networks  | Cryptography | Data encryption (Computer science) | Electronic data processing -- Management | Algorithms | Computers and civilization | Data protection | Computer Communication Networks | Cryptology | IT Operations | Algorithms | Computers and Society | Data and Information SecurityAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 004.6 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the thoroughly refereed post-conference proceedings of the 7th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2010, held in  Athens, Greece, in September 2010. The 14 revised full papers presented together with an invited article were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections on authentication mechanisms; privacy preserving techniques; PKI & PKC applications; electronic signature schemes; identity management.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the thoroughly refereed post-conference proceedings of the 7th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2010, held in  Athens, Greece, in September 2010. The 14 revised full papers presented together with an invited article were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections on authentication mechanisms; privacy preserving techniques; PKI & PKC applications; electronic signature schemes; identity management.

There are no comments for this item.

Log in to your account to post a comment.