Public Key Infrastructure

4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007. Proceedings

Editors:

ISBN: 978-3-540-73407-9 (Print) 978-3-540-73408-6 (Online)

Table of contents (29 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-17

    Authorization Architectures for Privacy-Respecting Surveillance

  3. No Access

    Book Chapter

    Pages 18-33

    Privacy-Preserving Revocation Checking with Modified CRLs

  4. No Access

    Book Chapter

    Pages 34-48

    E-Passports as a Means Towards the First World-Wide Public Key Infrastructure

  5. No Access

    Book Chapter

    Pages 49-64

    An Interdomain PKI Model Based on Trust Lists

  6. No Access

    Book Chapter

    Pages 65-77

    One-More Extension of Paillier Inversion Problem and Concurrent Secure Identification

  7. No Access

    Book Chapter

    Pages 78-93

    An Efficient Signcryption Scheme with Key Privacy

  8. No Access

    Book Chapter

    Pages 94-109

    Direct Chosen-Ciphertext Secure Hierarchical ID-Based Encryption Schemes

  9. No Access

    Book Chapter

    Pages 110-125

    Certificate-Based Signature: Security Model and Efficient Construction

  10. No Access

    Book Chapter

    Pages 126-142

    Time Capsule Signature: Efficient and Provably Secure Constructions

  11. No Access

    Book Chapter

    Pages 143-153

    A New Variant for an Attack Against RSA Signature Verification Using Parameter Field

  12. No Access

    Book Chapter

    Pages 154-169

    AutoPKI: A PKI Resources Discovery System

  13. No Access

    Book Chapter

    Pages 170-180

    Bootstrapping a Global SSO from Network Access Control Mechanisms

  14. No Access

    Book Chapter

    Pages 181-192

    Anonymous k-Show Credentials

  15. No Access

    Book Chapter

    Pages 193-202

    On Partial Anonymity in Secret Sharing

  16. No Access

    Book Chapter

    Pages 203-219

    Anonymous Identification and Designated-Verifiers Signatures from Insecure Batch Verification

  17. No Access

    Book Chapter

    Pages 220-235

    OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure’s Hardware Security Modules

  18. No Access

    Book Chapter

    Pages 236-247

    Two Worlds, One Smart Card: An Integrated Solution for Physical Access and Logical Security Using PKI on a Single Smart Card

  19. No Access

    Book Chapter

    Pages 248-264

    On the Robustness of Applications Based on the SSL and TLS Security Protocols

  20. No Access

    Book Chapter

    Pages 265-279

    Using WebDAV for Improved Certificate Revocation and Publication

  21. No Access

    Book Chapter

    Pages 280-296

    Reducing the Computational Cost of Certification Path Validation in Mobile Payment

previous Page of 2