default search action
6. EuroPKI 2009: Pisa, Italy
- Fabio Martinelli, Bart Preneel:
Public Key Infrastructures, Services and Applications - 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers. Lecture Notes in Computer Science 6391, Springer 2010, ISBN 978-3-642-16440-8
Certificateless Encryption
- Alexander W. Dent:
A Brief Introduction to Certificateless Encryption Schemes and Their Infrastructures. 1-16
Certificates and Revocation
- Gabriel A. Weaver, Scott A. Rea, Sean W. Smith:
A Computational Framework for Certificate Policy Operations. 17-33 - Vishwas Patil, Paolo Gasti, Luigi V. Mancini, Giovanni Chiola:
Resource Management with X.509 Inter-domain Authorization Certificates (InterAC). 34-50 - Mona Holsve Ofigsbø, Stig Fr. Mjølsnes, Poul E. Heegaard, Leif Nilsen:
Reducing the Cost of Certificate Revocation: A Case Study. 51-66
Cryptographic Protocols
- Endre Bangerter, Thomas Briner, Wilko Henecka, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider:
Automatic Generation of Sigma-Protocols. 67-82 - Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Claude Bajard:
A Secure and Efficient Authenticated Diffie-Hellman Protocol. 83-98 - Hoon Wei Lim:
Key Management for Large-Scale Distributed Storage Systems. 99-113
PKI in Practice
- Christian Schanes, Andreas Mauczka, Uwe Kirchengast, Thomas Grechenig, Sven Marx:
Nationwide PKI Testing - Ensuring Interoperability of OCSP Server and Client Implementations Early during Component Tests. 114-129 - Roberto Gallo, Henrique Kawakami, Ricardo Dahab:
On Device Identity Establishment and Verification. 130-145 - Chris Masone, Sean W. Smith:
ABUSE: PKI for Real-World Email Trust. 146-162
Encryption and Auctions
- Qiang Tang, Liqun Chen:
Public-Key Encryption with Registered Keyword Search. 163-178 - Kun Peng, Feng Bao:
Practicalization of a Range Test and Its Application to E-Auction. 179-194 - Qiang Tang:
Timed-Ephemerizer: Make Assured Data Appear and Disappear. 195-208
Reputation and User Aspects
- Stefan Schiffner, Sebastian Clauß, Sandra Steinbrecher:
Privacy and Liveliness for Reputation Systems. 209-224 - Isaac Agudo, M. Carmen Fernández Gago, Javier López:
A Multidimensional Reputation Scheme for Identity Federations. 225-238 - Massimiliano Pala, Yifei Wang:
On the Usability of User Interfaces for Secure Website Authentication in Browsers. 239-254
Digital Signatures
- Harald Baier, Vangelis Karatsiolis:
Validity Models of Electronic Signatures and Their Enforcement in Practice. 255-270 - Neyire Deniz Sarier:
Biometric Identity Based Signature Revisited. 271-285 - Tsz Hon Yuen, Willy Susilo, Yi Mu:
How to Construct Identity-Based Signatures without the Key Escrow Problem. 286-301
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.