Public Key Infrastructures, Services and Applications
Martinelli, Fabio.
Public Key Infrastructures, Services and Applications 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers / [recurso electrónico] : edited by Fabio Martinelli, Bart Preneel. - X, 303p. 41 illus. online resource. - Lecture Notes in Computer Science, 6391 0302-9743 ; . - Lecture Notes in Computer Science, 6391 .
Certificateless Encryption -- A Brief Introduction to Certificateless Encryption Schemes and Their Infrastructures -- Certificates and Revocation -- A Computational Framework for Certificate Policy Operations -- Resource Management with X.509 Inter-domain Authorization Certificates (InterAC) -- Reducing the Cost of Certificate Revocation: A Case Study -- Cryptographic Protocols -- Automatic Generation of Sigma-Protocols -- A Secure and Efficient Authenticated Diffie–Hellman Protocol -- Key Management for Large-Scale Distributed Storage Systems -- PKI in Practice -- Nationwide PKI Testing – Ensuring Interoperability of OCSP Server and Client Implementations Early during Component Tests -- On Device Identity Establishment and Verification -- ABUSE: PKI for Real-World Email Trust -- Encryption and Auctions -- Public-Key Encryption with Registered Keyword Search -- Practicalization of a Range Test and Its Application to E-Auction -- Timed-Ephemerizer: Make Assured Data Appear and Disappear -- Reputation and User Aspects -- Privacy and Liveliness for Reputation Systems -- A Multidimensional Reputation Scheme for Identity Federations -- On the Usability of User Interfaces for Secure Website Authentication in Browsers -- Digital Signatures -- Validity Models of Electronic Signatures and Their Enforcement in Practice -- Biometric Identity Based Signature Revisited -- How to Construct Identity-Based Signatures without the Key Escrow Problem.
Thisbookcontainsthepostproceedingsofthe6thEuropeanWorkshoponPublic Key Services, Applications and Infrastructures, which was held at the CNR Research Area in Pisa, Italy, in September 2009. The EuroPKI workshop series focuses on all research and practice aspects of public key infrastructures, services and applications, and welcomes original research papers and excellent survey contributions from academia, government, and industry. Previous events of the series were held in: Samos, Greece (2004); Kent, UK (2005); Turin, Italy, (2006); Palma de Mallorca, Spain, (2007); and Trondheim, Norway (2008). From the original focus on public key infrastructures, EuroPKI interests - panded to include advanced cryptographic techniques, applications and (more generally) services. The Workshops brings together researchersfrom the cryp- graphiccommunity as well as fromthe applied security community, as witnessed by the interesting program. Indeed, this volume holds 18 refereed papers and the presentation paper by the invited speaker, Alexander Dent. In response to the EuroPKI 2009 call for papers, a total of 40 submissions were received. All submissions underwent a thorough blind review by at least three ProgramCommittee members, resulting in careful selection and revision of the accepted papers. After the conference, the papers were revised and improved by the authors before inclusion in this volume.
9783642164415
Computer science.
Computer Communication Networks.
Data protection.
Data encryption (Computer science).
Computer software.
Information Systems.
Computer Science.
Computer Communication Networks.
Data Encryption.
Management of Computing and Information Systems.
Algorithm Analysis and Problem Complexity.
Computers and Society.
Systems and Data Security.
TK5105.5-5105.9
004.6
Public Key Infrastructures, Services and Applications 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers / [recurso electrónico] : edited by Fabio Martinelli, Bart Preneel. - X, 303p. 41 illus. online resource. - Lecture Notes in Computer Science, 6391 0302-9743 ; . - Lecture Notes in Computer Science, 6391 .
Certificateless Encryption -- A Brief Introduction to Certificateless Encryption Schemes and Their Infrastructures -- Certificates and Revocation -- A Computational Framework for Certificate Policy Operations -- Resource Management with X.509 Inter-domain Authorization Certificates (InterAC) -- Reducing the Cost of Certificate Revocation: A Case Study -- Cryptographic Protocols -- Automatic Generation of Sigma-Protocols -- A Secure and Efficient Authenticated Diffie–Hellman Protocol -- Key Management for Large-Scale Distributed Storage Systems -- PKI in Practice -- Nationwide PKI Testing – Ensuring Interoperability of OCSP Server and Client Implementations Early during Component Tests -- On Device Identity Establishment and Verification -- ABUSE: PKI for Real-World Email Trust -- Encryption and Auctions -- Public-Key Encryption with Registered Keyword Search -- Practicalization of a Range Test and Its Application to E-Auction -- Timed-Ephemerizer: Make Assured Data Appear and Disappear -- Reputation and User Aspects -- Privacy and Liveliness for Reputation Systems -- A Multidimensional Reputation Scheme for Identity Federations -- On the Usability of User Interfaces for Secure Website Authentication in Browsers -- Digital Signatures -- Validity Models of Electronic Signatures and Their Enforcement in Practice -- Biometric Identity Based Signature Revisited -- How to Construct Identity-Based Signatures without the Key Escrow Problem.
Thisbookcontainsthepostproceedingsofthe6thEuropeanWorkshoponPublic Key Services, Applications and Infrastructures, which was held at the CNR Research Area in Pisa, Italy, in September 2009. The EuroPKI workshop series focuses on all research and practice aspects of public key infrastructures, services and applications, and welcomes original research papers and excellent survey contributions from academia, government, and industry. Previous events of the series were held in: Samos, Greece (2004); Kent, UK (2005); Turin, Italy, (2006); Palma de Mallorca, Spain, (2007); and Trondheim, Norway (2008). From the original focus on public key infrastructures, EuroPKI interests - panded to include advanced cryptographic techniques, applications and (more generally) services. The Workshops brings together researchersfrom the cryp- graphiccommunity as well as fromthe applied security community, as witnessed by the interesting program. Indeed, this volume holds 18 refereed papers and the presentation paper by the invited speaker, Alexander Dent. In response to the EuroPKI 2009 call for papers, a total of 40 submissions were received. All submissions underwent a thorough blind review by at least three ProgramCommittee members, resulting in careful selection and revision of the accepted papers. After the conference, the papers were revised and improved by the authors before inclusion in this volume.
9783642164415
Computer science.
Computer Communication Networks.
Data protection.
Data encryption (Computer science).
Computer software.
Information Systems.
Computer Science.
Computer Communication Networks.
Data Encryption.
Management of Computing and Information Systems.
Algorithm Analysis and Problem Complexity.
Computers and Society.
Systems and Data Security.
TK5105.5-5105.9
004.6