|
Showing 1 - 4 of
4 matches in All Departments
This book contains the proceedings of the 5th European Public Key
Infrastr- ture Workshop: Theory and Practice, EuroPKI 2008, which
was held on the NTNU campus Gloshaugen in Trondheim, Norway, in
June 2008. The EuroPKI workshop series focuses on all research and
practice aspects of public key infrastructures, services and
applications, and welcomes original research papers and excellent
survey contributions from academia, government, and industry.
Simplyput,
publickeysareeasiertodistributethansecretkeys.Nevertheless,
constructing e?ective, practical, secure and low cost means for
assuring auth- ticity and validity of public keys used in
large-scale networked services remains both a technological and
organizational challenge. In a nutshell, this is the PKI problem,
and the papers presented herein propose new solutions and insight
for these questions. This volume holds 16 refereedpapers including
the presentationpaper by the invited speaker P. Landrock. In
response to the EuroPKI 2008 call for papers, a total of 37 paper
proposalswere received. All submissions underwenta thorough blind
review by at least three PC members, resulting in a careful
selection and revision of the accepted papers. The authors came
from 10 countries: Belgium, Brazil, Canada, Finland, Germany,
Japan, Malaysia, Norway, Spain, and the
USA.Theacceptedpaperswereorganizedintothe topicalsessions:
InvitedTalk, Certi?cates, Authentication, Practice, Signatures,
Analysis, and Networks.
With most services and products now being offered through digital
communications, new challenges have emerged for information
security specialists. A Multidisciplinary Introduction to
Information Security presents a range of topics on the security,
privacy, and safety of information and communication technology. It
brings together methods in pure mathematics, computer and
telecommunication sciences, and social sciences. The book begins
with the cryptographic algorithms of the Advanced Encryption
Standard (AES) and Rivest, Shamir, and Adleman (RSA). It explains
the mathematical reasoning behind public key cryptography and the
properties of a cryptographic hash function before presenting the
principles and examples of quantum cryptography. The text also
describes the use of cryptographic primitives in the communication
process, explains how a public key infrastructure can mitigate the
problem of crypto-key distribution, and discusses the security
problems of wireless network access. After examining past and
present protection mechanisms in the global mobile
telecommunication system, the book proposes a software engineering
practice that prevents attacks and misuse of software. It then
presents an evaluation method for ensuring security requirements of
products and systems, covers methods and tools of digital forensics
and computational forensics, and describes risk assessment as part
of the larger activity of risk management. The final chapter
focuses on information security from an organizational and people
point of view. As our ways of communicating and doing business
continue to shift, information security professionals must find
answers to evolving issues. Offering a starting point for more
advanced work in the field, this volume addresses various security
and privacy problems and solutions related to the latest
information and communication technology.
|
Technology and Practice of Passwords - 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings (Paperback, 1st ed. 2016)
Frank Stajano, Stig F. Mjolsnes, Graeme Jenkinson, Per Thorsheim
|
R1,767
Discovery Miles 17 670
|
Ships in 10 - 15 working days
|
This book constitutes the thoroughly refereed
post-conferenceproceedings of the 9th International Conference on
Passwords, PASSWORDS2015, held in Cambridge, UK, in December 2015.
The 6 revised full papers presented together with 3 revised short
paperswere carefully reviewed and selected from 32 initial
submissions. Thepapers are organized in topical sections on human
factors, attacks, and cryptography.
This book constitutes the thoroughly refereed post-conference
proceedings of the 7th International Conference on Passwords,
PASSWORDS 2014, held in Trondheim, Norway, in December 2014. The 8
revised full papers presented together with 2 revised short papers
were carefully reviewed and selected from 30 initial submissions.
The papers are organized in topical sections on hash functions,
usability, analyses and new techniques.
|
|