Public Key Infrastructure: First European PKI Workshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the First European Public Key Infrastructure Workshop: Research and Applications, EuroPKI 2004, held on Samos Island, Greece in June 2004.

The 25 revised full papers and 5 revised short papers presented were carefully reviewed and selected from 73 submissions. The papers address all current issues in PKI, ranging from theoretical and foundational topics to applications and regulatory issues in various contexts.

Author(s): Danny De Cock, Karel Wouters, Bart Preneel (auth.), Sokratis K. Katsikas, Stefanos Gritzalis, Javier López (eds.)
Series: Lecture Notes in Computer Science 3093
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2004

Language: English
Pages: 386
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Information Storage and Retrieval; Information Systems Applications (incl.Internet); Computers and Society; Management of Computing and Information Systems

Front Matter....Pages -
Introduction to the Belgian EID Card....Pages 1-13
The EuroPKI Experience....Pages 14-27
CERVANTES – A Certificate Validation Test-Bed....Pages 28-42
Flexible and Scalable Public Key Security for SSH....Pages 43-56
What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved....Pages 57-70
Identity-Based Cryptography in Public Key Management....Pages 71-84
Pre-production Methods of a Response to Certificates with the Common Status –Design and Theoretical Evaluation–....Pages 85-97
Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures....Pages 98-111
A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications....Pages 112-125
Using LDAP Directories for Management of PKI Processes....Pages 126-134
Recursive Certificate Structures for X.509 Systems....Pages 135-148
A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions....Pages 149-159
A Practical Approach of X.509 Attribute Certificate Framework as Support to Obtain Privilege Delegation....Pages 160-172
TACAR: a Simple and Fast Way for Building Trust among PKIs....Pages 173-179
On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments....Pages 180-190
A Socially Inspired Reputation Model....Pages 191-204
Using EMV Cards for Single Sign-On....Pages 205-217
Distributing Security-Mediated PKI....Pages 218-231
Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography....Pages 232-245
ÆTHER: an Authorization Management Architecture for Ubiquitous Computing....Pages 246-259
Trustworthy Accounting for Wireless LAN Sharing Communities....Pages 260-273
Mobile Qualified Electronic Signatures and Certification on Demand....Pages 274-286
Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks....Pages 287-296
A Credential Conversion Service for SAML-based Scenarios....Pages 297-305
A New Design of Privilege Management Infrastructure with Binding Signature Semantics....Pages 306-313
How to Qualify Electronic Signatures and Time Stamps....Pages 314-321
An Efficient Revocation Scheme for Stateless Receivers....Pages 322-334
On the Use of Weber Polynomials in Elliptic Curve Cryptography....Pages 335-349
Threshold Password-Based Authentication Using Bilinear Pairings....Pages 350-363
An Efficient Group Key Management Scheme for Secure Multicast with Multimedia Applications....Pages 364-378
Back Matter....Pages -