Skip to main content
  • Conference proceedings
  • © 2010

Public Key Infrastructures, Services and Applications

6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers

  • State-of-the-art research
  • Fast-track conference proceedings
  • Unique visibility

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6391)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): EuroPKI: European Public Key Infrastructure Workshop

Conference proceedings info: EuroPKI 2009.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (19 papers)

  1. Front Matter

  2. Certificateless Encryption

  3. Certificates and Revocation

    1. A Computational Framework for Certificate Policy Operations

      • Gabriel A. Weaver, Scott Rea, Sean W. Smith
      Pages 17-33
    2. Resource Management with X.509 Inter-domain Authorization Certificates (InterAC)

      • Vishwas Patil, Paolo Gasti, Luigi Mancini, Giovanni Chiola
      Pages 34-50
    3. Reducing the Cost of Certificate Revocation: A Case Study

      • Mona H. Ofigsbø, Stig Frode Mjølsnes, Poul Heegaard, Leif Nilsen
      Pages 51-66
  4. Cryptographic Protocols

    1. Automatic Generation of Sigma-Protocols

      • Endre Bangerter, Thomas Briner, Wilko Henecka, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
      Pages 67-82
    2. A Secure and Efficient Authenticated Diffie–Hellman Protocol

      • Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Claude Bajard
      Pages 83-98
  5. PKI in Practice

    1. Nationwide PKI Testing – Ensuring Interoperability of OCSP Server and Client Implementations Early during Component Tests

      • Christian Schanes, Andreas Mauczka, Uwe Kirchengast, Thomas Grechenig, Sven Marx
      Pages 114-129
    2. On Device Identity Establishment and Verification

      • Roberto Gallo, Henrique Kawakami, Ricardo Dahab
      Pages 130-145
    3. ABUSE: PKI for Real-World Email Trust

      • Chris Masone, Sean W. Smith
      Pages 146-162
  6. Encryption and Auctions

    1. Public-Key Encryption with Registered Keyword Search

      • Qiang Tang, Liqun Chen
      Pages 163-178
  7. Reputation and User Aspects

    1. Privacy and Liveliness for Reputation Systems

      • Stefan Schiffner, Sebastian Clauß, Sandra Steinbrecher
      Pages 209-224
    2. A Multidimensional Reputation Scheme for Identity Federations

      • Isaac Agudo, Carmen Fernandez-Gago, Javier Lopez
      Pages 225-238
  8. Digital Signatures

    1. Validity Models of Electronic Signatures and Their Enforcement in Practice

      • Harald Baier, Vangelis Karatsiolis
      Pages 255-270
    2. Biometric Identity Based Signature Revisited

      • Neyire Deniz Sarier
      Pages 271-285
    3. How to Construct Identity-Based Signatures without the Key Escrow Problem

      • Tsz Hon Yuen, Willy Susilo, Yi Mu
      Pages 286-301

Other Volumes

  1. Public Key Infrastructures, Services and Applications

Editors and Affiliations

  • National Research Council (C.N.R.), Istituto di Informatica e Telematica (IIT), Pisa, Italy

    Fabio Martinelli

  • Dept. Electrical Engineering-ESAT/COSIC, Katholieke Universiteit Leuven, Leuven, Belgium

    Bart Preneel

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access