Public Key Infrastructures, Services and Applications

8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers

  • Svetla Petkova-Nikova
  • Andreas Pashalidis
  • Günther Pernul
Conference proceedings EuroPKI 2011

DOI: 10.1007/978-3-642-29804-2

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7163)

Table of contents (13 papers)

  1. Front Matter
  2. Authentication Mechanisms

    1. Secret Handshake Scheme with Request-Based-Revealing
      Yutaka Kawai, Noboru Kunihiro
      Pages 1-16
    2. Password-Based Signatures
      Kristian Gjøsteen, Øystein Thuen
      Pages 17-33
    3. Isolating Partial Information of Indistinguishable Encryptions
      Jean Lancrenon, Roland Gillard
      Pages 34-48
  3. Invited Paper

    1. A Universal Client-Based Identity Management Tool
      Haitham S. Al-Sinani, Chris J. Mitchell
      Pages 49-74
  4. Privacy Preserving Techniques

    1. Insider Attacks and Privacy of RFID Protocols
      Ton van Deursen, Saša Radomirović
      Pages 91-105
    2. Cell-Based Roadpricing
      Flavio D. Garcia, Eric R. Verheul, Bart Jacobs
      Pages 106-122
  5. Invited Paper

  6. PKI Applications

    1. A PKI-Based Mobile Banking Demonstrator
      Gauthier Van Damme, Nicolas Luyckx, Karel Wouters
      Pages 147-158
    2. Certification Validation: Back to the Past
      Moez Ben M’Barka, Julien P. Stern
      Pages 159-175
  7. Secure Applications

    1. A Hijacker’s Guide to the LPC Bus
      Johannes Winter, Kurt Dietrich
      Pages 176-193
    2. Secure Event Logging in Sensor Networks
      An Braeken, Antonio De La Piedro, Karel Wouters
      Pages 194-208
  8. Back Matter

About these proceedings


This book constitutes the thoroughly refereed post-conference proceedings of the 8th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2011, held in Leuven, Belgium in September 2011 - co-located with the 16th European Symposium on Research in Computer Security, ESORICS 2011. The 10 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 27 submissions. The papers are organized in topical sections on authentication mechanisms, privacy preserving techniques, PKI and secure applications.


RSA signatures anonymity indistinguishable encryptions provable security risk management

Editors and affiliations

  • Svetla Petkova-Nikova
    • 1
  • Andreas Pashalidis
    • 2
  • Günther Pernul
    • 3
  1. 1.University of Twente and Katholieke Universiteit Leuven ESAT-COSICLeuven-HeverleeBelgium
  2. 2.Katholieke Universiteit Leuven, ESAT/SCD (COSIC)Leuven-HeverleeBelgium
  3. 3.Department of Information SystemsUniversity of RegensburgRegensburgGermany

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-29803-5
  • Online ISBN 978-3-642-29804-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349