Public Key Infrastructure First European PKI Workshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004. Proceedings /

This book constitutes the refereed proceedings of the First European Public Key Infrastructure Workshop: Research and Applications, EuroPKI 2004, held on Samos Island, Greece in June 2004. The 25 revised full papers and 5 revised short papers presented were carefully reviewed and selected from 73 su...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Katsikas, Sokratis K. (Επιμελητής έκδοσης), Gritzalis, Stefanos (Επιμελητής έκδοσης), López, Javier (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2004.
Σειρά:Lecture Notes in Computer Science, 3093
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • to the Belgian EID Card
  • The EuroPKI Experience
  • CERVANTES – A Certificate Validation Test-Bed
  • Flexible and Scalable Public Key Security for SSH
  • What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved
  • Identity-Based Cryptography in Public Key Management
  • Pre-production Methods of a Response to Certificates with the Common Status –Design and Theoretical Evaluation–
  • Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures
  • A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications
  • Using LDAP Directories for Management of PKI Processes
  • Recursive Certificate Structures for X.509 Systems
  • A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions
  • A Practical Approach of X.509 Attribute Certificate Framework as Support to Obtain Privilege Delegation
  • TACAR: a Simple and Fast Way for Building Trust among PKIs
  • On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments
  • A Socially Inspired Reputation Model
  • Using EMV Cards for Single Sign-On
  • Distributing Security-Mediated PKI
  • Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography
  • ÆTHER: an Authorization Management Architecture for Ubiquitous Computing
  • Trustworthy Accounting for Wireless LAN Sharing Communities
  • Mobile Qualified Electronic Signatures and Certification on Demand
  • Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks
  • A Credential Conversion Service for SAML-based Scenarios
  • A New Design of Privilege Management Infrastructure with Binding Signature Semantics
  • How to Qualify Electronic Signatures and Time Stamps
  • An Efficient Revocation Scheme for Stateless Receivers
  • On the Use of Weber Polynomials in Elliptic Curve Cryptography
  • Threshold Password-Based Authentication Using Bilinear Pairings
  • An Efficient Group Key Management Scheme for Secure Multicast with Multimedia Applications.