Public Key Infrastructure First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings

This book constitutes the refereed proceedings of the First European Public Key Infrastructure Workshop: Research and Applications, EuroPKI 2004, held on Samos Island, Greece in June 2004. The 25 revised full papers and 5 revised short papers presented were carefully reviewed and selected from 73 su...

Full description

Bibliographic Details
Other Authors: Katsikas, Sokratis K. (Editor), Gritzalis, Stefanos (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2004, 2004
Edition:1st ed. 2004
Series:Lecture Notes in Computer Science
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
Table of Contents:
  • Threshold Password-Based Authentication Using Bilinear Pairings
  • An Efficient Group Key Management Scheme for Secure Multicast with Multimedia Applications
  • to the Belgian EID Card
  • The EuroPKI Experience
  • CERVANTES – A Certificate Validation Test-Bed
  • Flexible and Scalable Public Key Security for SSH
  • What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved
  • Identity-Based Cryptography in Public Key Management
  • Pre-production Methods of a Response to Certificates with the Common Status –Design and Theoretical Evaluation–
  • Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures
  • A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications
  • Using LDAP Directories for Management of PKI Processes
  • Recursive Certificate Structures for X.509 Systems
  • A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions
  • A Practical Approach of X.509 Attribute Certificate Framework as Support to Obtain Privilege Delegation
  • TACAR: a Simple and Fast Way for Building Trust among PKIs
  • On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments
  • A Socially Inspired Reputation Model
  • Using EMV Cards for Single Sign-On
  • Distributing Security-Mediated PKI
  • Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography
  • ÆTHER: an Authorization Management Architecture for Ubiquitous Computing
  • Trustworthy Accounting for Wireless LAN Sharing Communities
  • Mobile Qualified Electronic Signatures and Certification on Demand
  • Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks
  • A Credential Conversion Service for SAML-based Scenarios
  • A New Design of Privilege Management Infrastructure with Binding Signature Semantics
  • How to Qualify Electronic Signatures and Time Stamps
  • An EfficientRevocation Scheme for Stateless Receivers
  • On the Use of Weber Polynomials in Elliptic Curve Cryptography