default search action
3. EuroPKI 2006: Torino, Italy
- Andrea S. Atzeni, Antonio Lioy:
Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings. Lecture Notes in Computer Science 4043, Springer 2006, ISBN 3-540-35151-5
PKI Management
- Jon Ølnes, Leif Buene:
Use of a Validation Authority to Provide Risk Management for the PKI Relying Party. 1-15 - Meiyuan Zhao, Sean W. Smith:
Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKI. 16-30 - Jong-Phil Yang, Kouichi Sakurai, Kyung Hyune Rhee:
Distributing Security-Mediated PKI Revisited. 31-44
Authentication I
- Eun-Jun Yoon, Kee-Young Yoo:
An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card. 45-53 - Seung Wook Jung, Souhwan Jung:
Forward Secure Password-Enabled PKI with Instant Revocation. 54-67 - Willy Susilo, Yi Mu:
Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. 68-80
Cryptography
- David Galindo, Paz Morillo, Carla Ràfols:
Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes. 81-91 - Yongtae Kim, Chang Han Kim, Taek-Young Youn:
On the Security of Multilevel Cryptosystems over Class Semigroups of Imaginary Quadratic Non-maximal Orders. 92-100 - Man Ho Au, Sherman S. M. Chow, Willy Susilo, Patrick P. Tsang:
Short Linkable Ring Signatures Revisited. 101-115
Applications
- Stephen T. Kent:
An Infrastructure Supporting Secure Internet Routing. 116-129 - Massimiliano Pala, Antonio Lioy:
Fighting E-Mail Abuses: The EMPE Approach. 130-144 - Stephen Farrell:
DomainKeys Identified Mail Demonstrates Good Reasons to Re-invent the Wheel. 145-153 - Sebastian Fritsch, Vangelis Karatsiolis, Marcus Lippert, Alexander Wiesmaier, Johannes Buchmann:
Towards Secure Electronic Workflows. 154-168 - Manuel Sánchez, Gabriel López, Óscar Cánovas Reverte, Juan A. Sánchez, Antonio Fernandez Gómez-Skarmeta:
An Access Control System for Multimedia Content Distribution. 169-183 - Jin Wook Byun, Dong Hoon Lee, Jongin Lim:
Efficient Conjunctive Keyword Search on Encrypted Data Storage System. 184-196
Authentication II
- Eun-Jun Yoon, Kee-Young Yoo:
Enhanced Forward-Secure User Authentication Scheme with Smart Cards. 197-206 - Ke Zeng:
Pseudonymous PKI for Ubiquitous Computing. 207-222 - Sungduk Kim, Kyungjin Kim, Jaedong Jung, Dongho Won:
An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI. 223-232 - Maurizio Adriano Strangio:
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation. 233-247
Short Contributions
- YoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won:
A PKI System for Detecting the Exposure of a User's Secret Key. 248-250 - Lenka Kadlcáková:
A Guide to the Nightmares of the Certification Service Provider. 251-253 - Chung-Ming Ou, Chung-Ren Ou:
A High-Level 3G Wireless PKI Solution for Secure Healthcare Communications. 254-256 - Sherman S. M. Chow:
Identity-Based Strong Multi-Designated Verifiers Signatures. 257-259
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.