ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
14
views
16
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,567
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Public Key Infrastructures, Services and Applications
Personal PKI for the Smart Device Era
other
Author(s):
John Lyle
,
Andrew Paverd
,
Justin King-Lacroix
,
Andrea Atzeni
,
Habib Virji
,
Ivan Flechais
,
Shamal Faily
Publication date
(Print):
2013
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH title and first author match)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Smart Contracts Programming Languages
Most cited references
16
Record
: found
Abstract
: not found
Conference Proceedings
: not found
These aren't the droids you're looking for
Seungyeop Han
,
Peter Hornyack
,
Jaeyeon Jung
…
(2011)
0
comments
Cited
19
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Is this app safe?
Pern Hui Chia
,
N Asokan
,
Yusuke Yamamoto
(2012)
0
comments
Cited
15
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Secure device pairing based on a visual channel
N Asokan
,
K. Kostiainen
,
J.-E. Ekberg
…
(2006)
0
comments
Cited
15
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2013
Pages
: 69-84
DOI:
10.1007/978-3-642-40012-4_5
SO-VID:
5f0dcbb3-bb18-4297-a263-24c8f6a5b937
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Analysis of Lattice Reduction Attack against the Somewhat Homomorphic Encryption Based on Ideal Lattices
pp. 17
Group Key Exchange Resilient to Leakage of Ephemeral Secret Keys with Strong Contributiveness
pp. 37
Efficient Public Key Encryption Admitting Decryption by Sender
pp. 53
How to Avoid the Breakdown of Public Key Infrastructures
pp. 69
Personal PKI for the Smart Device Era
pp. 85
The Notary Based PKI
pp. 98
How to Bootstrap Trust among Devices in Wireless Environments via EAP-STLS
pp. 128
GeoPKI: Converting Spatial Trust into Certificate Trust
pp. 145
Waltzing the Bear, or: A Trusted Virtual Security Module
pp. 161
Cross-Unlinkable Hierarchical Group Signatures
pp. 178
Non-interactive Public Accountability for Sanitizable Signatures
Similar content
1,567
Securing mobile ad hoc networks using distributed firewall with PKI
Authors:
PKI Key Generation Based on Iris Features
Authors:
Yazhuo Gong
,
Kaifa Deng
,
Pengfei Shi
A PKI-free key agreement protocol for P2P VoIP applications
Authors:
Riccardo Pecori
,
R. Pecori
See all similar