Skip to main content
  • Conference proceedings
  • © 2013

Public Key Infrastructures, Services and Applications

9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers

  • Fast conference proceedings
  • State-of-the-art report
  • Up to date results

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7868)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): EuroPKI: European Public Key Infrastructure Workshop

Conference proceedings info: EuroPKI 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (12 papers)

  1. Front Matter

  2. Cryptographic Schemas and Protocols

    1. Analysis of Lattice Reduction Attack against the Somewhat Homomorphic Encryption Based on Ideal Lattices

      • Masaya Yasuda, Jun Yajima, Takeshi Shimoyama, Jun Kogure
      Pages 1-16
  3. Public Key Infrastructure

    1. How to Avoid the Breakdown of Public Key Infrastructures

      • Johannes Braun, Andreas HĂĽlsing, Alex Wiesmaier, MartĂ­n A. G. Vigil, Johannes Buchmann
      Pages 53-68
    2. Personal PKI for the Smart Device Era

      • John Lyle, Andrew Paverd, Justin King-Lacroix, Andrea Atzeni, Habib Virji, Ivan Flechais et al.
      Pages 69-84
    3. The Notary Based PKI

      • MartĂ­n A. G. Vigil, Cristian T. Moecke, Ricardo F. CustĂłdio, Melanie Volkamer
      Pages 85-97
  4. Wireless Authentication and Revocation

    1. Anonymity Revocation through Standard Infrastructures

      • Jesus Diaz, David Arroyo, Francisco B. Rodriguez
      Pages 112-127
  5. Certificate and Trusted Computing

    1. GeoPKI: Converting Spatial Trust into Certificate Trust

      • Tiffany Hyun-Jin Kim, Virgil Gligor, Adrian Perrig
      Pages 128-144
    2. Waltzing the Bear, or: A Trusted Virtual Security Module

      • Ronald Toegl, Florian Reimair, Martin Pirker
      Pages 145-160
  6. Digital Signatures

    1. Cross-Unlinkable Hierarchical Group Signatures

      • Julien Bringer, HervĂ© Chabanne, Alain Patey
      Pages 161-177
    2. Non-interactive Public Accountability for Sanitizable Signatures

      • Christina Brzuska, Henrich C. Pöhls, Kai Samelin
      Pages 178-193
  7. Back Matter

Other Volumes

  1. Public Key Infrastructures, Services and Applications

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 9th European Workshop, EuroPKI 2012, held in Pisa, Italy, in September 2012. The 12 revised full papers presented were carefully selected from 30 submissions and cover topics such as Cryptographic Schemas and Protocols, Public Key Infrastructure, Wireless Authentication and Revocation, Certificate and Trusted Computing, and Digital Structures.

Editors and Affiliations

  • Dipartimento de Informatica, Universita’ degli Studi de Milano, Crema, Italy

    Sabrina Capitani di Vimercati

  • University of London, Surrey, UK

    Chris Mitchell

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access