FEEDBACK Smiley face
Public Key Infrastructure First European PKI Workshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004. Proceedings / [electronic resource] : edited by Sokratis K. Katsikas, Stefanos Gritzalis, Javier López. - XIV, 386 p. online resource. - Lecture Notes in Computer Science, 3093 0302-9743 ; . - Lecture Notes in Computer Science, 3093 .

to the Belgian EID Card -- The EuroPKI Experience -- CERVANTES – A Certificate Validation Test-Bed -- Flexible and Scalable Public Key Security for SSH -- What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved -- Identity-Based Cryptography in Public Key Management -- Pre-production Methods of a Response to Certificates with the Common Status –Design and Theoretical Evaluation– -- Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures -- A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications -- Using LDAP Directories for Management of PKI Processes -- Recursive Certificate Structures for X.509 Systems -- A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions -- A Practical Approach of X.509 Attribute Certificate Framework as Support to Obtain Privilege Delegation -- TACAR: a Simple and Fast Way for Building Trust among PKIs -- On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments -- A Socially Inspired Reputation Model -- Using EMV Cards for Single Sign-On -- Distributing Security-Mediated PKI -- Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography -- ÆTHER: an Authorization Management Architecture for Ubiquitous Computing -- Trustworthy Accounting for Wireless LAN Sharing Communities -- Mobile Qualified Electronic Signatures and Certification on Demand -- Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks -- A Credential Conversion Service for SAML-based Scenarios -- A New Design of Privilege Management Infrastructure with Binding Signature Semantics -- How to Qualify Electronic Signatures and Time Stamps -- An Efficient Revocation Scheme for Stateless Receivers -- On the Use of Weber Polynomials in Elliptic Curve Cryptography -- Threshold Password-Based Authentication Using Bilinear Pairings -- An Efficient Group Key Management Scheme for Secure Multicast with Multimedia Applications.

This book constitutes the refereed proceedings of the First European Public Key Infrastructure Workshop: Research and Applications, EuroPKI 2004, held on Samos Island, Greece in June 2004. The 25 revised full papers and 5 revised short papers presented were carefully reviewed and selected from 73 submissions. The papers address all current issues in PKI, ranging from theoretical and foundational topics to applications and regulatory issues in various contexts.


10.1007/b98201 doi

Computer science.
Data encryption (Computer science).
Information storage and retrieval.
Computers and civilization.
Management information systems.
Computer Science.
Data Encryption.
Algorithm Analysis and Problem Complexity.
Information Storage and Retrieval.
Information Systems Applications (incl. Internet).
Computers and Society.
Management of Computing and Information Systems.



© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: