Public Key Infrastructure Third European PKI Workshop: Theory and Pr
Today, PKIs have come of age and they support the security of several large networked systems, such as company-wide document management systems,- governmentapplicationsandsecureVPN.However,despitethissuccess,the?eld has not yet reachedits full scienti?c m
- PDF / 3,176,732 Bytes
- 270 Pages / 430 x 660 pts Page_size
- 71 Downloads / 233 Views
Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Moshe Y. Vardi Rice University, Houston, TX, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany
4043
Andrea S. Atzeni Antonio Lioy (Eds.)
Public Key Infrastructure Third European PKI Workshop: Theory and Practice, EuroPKI 2006 Turin, Italy, June 19-20, 2006 Proceedings
13
Volume Editors Andrea S. Atzeni Antonio Lioy Politecnico di Torino Dip. di Automatica ed Informatica Corso Duca degli Abruzzi, 24, 10129 Torino, Italy E-mail: {shocked,lioy}@polito.it
Library of Congress Control Number: 2006927052 CR Subject Classification (1998): E.3, D.4.6, C.2.0, F.2.1, H.3, H.4, K.4.4, K.6.5 LNCS Sublibrary: SL 4 – Security and Cryptology ISSN ISBN-10 ISBN-13
0302-9743 3-540-35151-5 Springer Berlin Heidelberg New York 978-3-540-35151-1 Springer Berlin Heidelberg New York
This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springer.com © Springer-Verlag Berlin Heidelberg 2006 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: 11774716 06/3142 543210
Preface
Today, PKIs have come of age and they support the security of several large networked systems, such as company-wide document management systems, egovernment applications and secure VPN. However, despite this success, the field has not yet reached its full scientific maturity and there is still room for research in this area. For example, open issues exist in the efficient management of large PKI (especially with respect to certificate validation), better performance could be attained by improved cryptographic techniques and innovative applications are continuously proposed. To discuss progress in the PKI field, the European PKI workshop series was established in 2004
Data Loading...