Listing 1 - 7 of 7 |
Sort by
|
Choose an application
Computer security --- Computers --- Data encryption (Computer science) --- Public key cryptography --- Sécurité informatique --- Ordinateurs --- Chiffrement (Informatique) --- Cryptographie à clé publique --- Congresses --- Access control --- Congrès --- Accès --- Contrôle --- Engineering & Applied Sciences --- Computer Science --- Sécurité informatique --- Cryptographie à clé publique --- Congrès --- Accès --- Contrôle --- EPUB-LIV-FT SPRINGER-B --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Computer Communication Networks. --- Computers and Society. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Distributed processing --- Computer software. --- Information Systems. --- Cryptology. --- Software, Computer --- Computer systems
Choose an application
Computer security --- Computers --- Data encryption (Computer science) --- Public key cryptography --- Sécurité informatique --- Ordinateurs --- Chiffrement (Informatique) --- Cryptographie à clé publique --- Congresses --- Access control --- Congresses. --- Congrès --- Accès --- Contrôle --- Computer security -- Congresses. --- Computers -- Access control -- Congresses. --- Data encryption (Computer science) -- Congresses. --- Electronic books. -- local. --- Public key cryptography -- Congresses. --- Public-key cryptography --- Engineering & Applied Sciences --- Computer Science --- Sécurité informatique --- Cryptographie à clé publique --- Congrès --- Accès --- Contrôle --- EPUB-LIV-FT SPRINGER-B --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer engineering. --- Computer Science. --- Data Encryption. --- Computer Engineering. --- Algorithm Analysis and Problem Complexity. --- Computer Communication Networks. --- Computers and Society. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Design and construction --- Communication systems --- Foundations --- Distributed processing --- Computer software. --- Information Systems. --- Cryptology. --- Software, Computer --- Computer systems
Choose an application
The 9th International Conference on Theory and Practice of Public-Key Cr- tography(PKC 2006) took place in New York City. PKC is the premier inter- tional conference dedicated to cryptology focusing on all aspects of public-key cryptography. The event is sponsored by the International Association of Cr- tologic Research (IACR), and this year it was also sponsored by the Columbia University Computer Science Department as well as a number of sponsors from industry, among them: EADS and Morgan Stanley, which were golden sponsors, as well as Gemplus, NTT DoCoMo, Google, Microsoft and RSA Security, which were silver sponsors. We acknowledge the generous support of our industrial sponsors; their support was a major contributing factor to the success of this year’s PKC. PKC 2006 followed a series of very successful conferences that started in 1998in Yokohama,Japan.Further meetingswereheld successivelyinKamakura (Japan), Melbourne (Australia), Jeju Island (Korea), Paris (France), Miami (USA), Singapore and Les Diablerets (Switzerland). The conference became an IACR sponsored event (o?cially designated as an IACR workshop) in 2003 and has been sponsored by IACR continuously since then. The year 2006 found us all in New York City where the undertone of the conference was hummed in the relentless rhythm of the city that never sleeps.
Computer security --- Computers --- Data encryption (Computer science) --- Public key cryptography --- Sécurité informatique --- Ordinateurs --- Chiffrement (Informatique) --- Cryptographie à clé publique --- Congresses --- Access control --- Congrès --- Accès --- Contrôle --- Computer Science --- Engineering & Applied Sciences --- Sécurité informatique --- Cryptographie à clé publique --- Congrès --- Accès --- Contrôle --- EPUB-LIV-FT SPRINGER-B --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Computer Communication Networks. --- Computers and Society. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Distributed processing --- Computer software. --- Information Systems. --- Cryptology. --- Software, Computer --- Computer systems --- Cryptography. --- Computer networks. --- Electronic data processing—Management. --- IT Operations. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers
Choose an application
Today, PKIs have come of age and they support the security of several large networked systems, such as company-wide document management systems,- governmentapplicationsandsecureVPN.However,despitethissuccess,the?eld has not yet reachedits full scienti?c maturity and there is still room for research in this area. For example, open issues exist in the e?cient management of large PKI (especially with respect to certi?cate validation), better performance could be attained by improved cryptographic techniques and innovative applications are continuously proposed. To discuss progress in the PKI ?eld, the European PKI workshop series was established in 2004, following similar initiatives in Asia and the USA. The ?rst two events of this series took place on the Island of Samos, Greece (EuroPKI 2004), and in Canterbury, UK (EuroPKI 2005). This book contains the proceedings of the Third European PKI Workshop (EuroPKI 2006), held at the Politecnico di Torino, Italy, on June 19-20, 2006. In response to the Call for Papers, about 50 submissions were received. All submissions werereviewed by at least two reviewers(external or members of the Program Committee) and most of them got three reviews. At the end of this process, 22 papers were selected, 18 in their full form and 4 as short papers. These papers led to a lively workshop, with a good mixture between theory and application, continuing the success of the previous workshops in the series.
Public key cryptography --- Data encryption (Computer science) --- Computer security --- Computer networks --- Cryptographie à clé publique --- Chiffrement (Informatique) --- Sécurité informatique --- Réseaux d'ordinateurs --- Congresses. --- Security measures --- Congrès --- Sécurité --- Mesures --- Public key infrastructure (Computer security) --- Computer Science --- Engineering & Applied Sciences --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Information storage and retrieval. --- Computers and civilization. --- Computer Science. --- Computer Communication Networks. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Information Storage and Retrieval. --- Information Systems Applications (incl. Internet). --- Computers and Society. --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Foundations --- Distributed processing --- Computer software. --- Information storage and retrieva. --- Cryptology. --- Software, Computer --- Computer systems --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
These proceedings contain the papers accepted at the 2007 European PKI Workshop: Theory and Practice (EuroPKI 2007), held in Palma de Mallorca, Spain, during June 28–30, and hosted by the Computer Science Department of the University of Balearic Islands (UIB) with the support of the Balearic Islands Government and the Private Law Department at UIB. This year’s event was the fourth event in the EuroPKI Workshops series. Previous events of the series were held in: Samos, Greece (2004); Kent, UK (2005); and Turin, Italy, (2006). In response to the call for papers, 77 papers were submitted to this year’s workshop, setting a record of the highest number of papers submitted to an EuroPKI event so far and confirming an increased interest in PKI research and in the EuroPKI event. Each paper was reviewed by three members of the Program Committee, and evaluated on the basis of its significance, novelty, technical quality and relevance to the workshop. The paper selection process was very competitive: of the papers submitted, only 21 full papers and 8 short papers were selected for presentation at the workshop and inclusion in this volume.
Public key infrastructure (Computer security) --- Public key cryptography --- Data encryption (Computer science) --- Computer networks --- Infrastructure à clé publique (Sécurité informatique) --- Cryptographie à clé publique --- Chiffrement (Informatique) --- Réseaux d'ordinateurs --- Congresses. --- Security measures --- Congrès --- Sécurité --- Mesures --- Computer Science --- Engineering & Applied Sciences --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer science. --- Data encryption (Computer science). --- Algorithms. --- Information storage and retrieval. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Information Storage and Retrieval. --- Information Systems Applications (incl. Internet). --- Computers and Society. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Informatics --- Science --- Communication systems --- Foundations --- Computer software. --- Information storage and retrieva. --- Information Systems. --- Cryptology. --- Software, Computer --- Computer systems --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book constitutes the refereed proceedings of the 5th European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2008, held in Trondheim, Norway, in June 2008. The 15 revised full papers presented together with 1 invited paper were carefully reviewed and selected from 37 submissions. Ranging from theoretical and foundational topics to applications and regulatory issues in various contexts, the papers focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and low cost means for assuring authenticity and validity of public keys used in large-scale networked services.
Public key infrastructure (Computer security) --- Public key cryptography --- Data encryption (Computer science) --- Computer networks --- Infrastructure à clé publique (Sécurité informatique) --- Cryptographie à clé publique --- Chiffrement (Informatique) --- Réseaux d'ordinateurs --- Congresses. --- Security measures --- Congrès --- Sécurité --- Mesures --- Computer Science --- Engineering & Applied Sciences --- Infrastructure, Public key (Computer security) --- PKI (Computer security) --- Trust hierarchy (Computer security) --- Computer science. --- Computer programming. --- Data encryption (Computer science). --- Algorithms. --- Information storage and retrieval. --- Computers and civilization. --- Computer Science. --- Data Encryption. --- Programming Techniques. --- Algorithm Analysis and Problem Complexity. --- Information Storage and Retrieval. --- Information Systems Applications (incl. Internet). --- Computers and Society. --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computers --- Electronic computer programming --- Electronic data processing --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Informatics --- Science --- Foundations --- Programming --- Computer software. --- Information storage and retrieva. --- Cryptology. --- Software, Computer --- Computer systems --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book constitutes the refereed proceedings of the 11th International Workshop on Practice and Theory in Public-Key Cryptography, PKC 2008, held in Barcelona, Spain, in March 2008. The 21 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, digital signatures, identification, broadcast and key agreement, implementation of fast arithmetic, and public key encryption.
Computer security --- Computers --- Data encryption (Computer science) --- Public key cryptography --- Sécurité informatique --- Ordinateurs --- Chiffrement (Informatique) --- Cryptographie à clé publique --- Congresses. --- Access control --- Congrès --- Accès --- Contrôle --- Computer Science --- Engineering & Applied Sciences --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Computer Communication Networks. --- Computers and Society. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Distributed processing --- Computer software. --- Information Systems. --- Cryptology. --- Software, Computer
Listing 1 - 7 of 7 |
Sort by
|