Thisbookcontainsthepostproceedingsofthe6thEuropeanWorkshoponPublic Key Services, Applications and Infrastructures, which was held at the CNR Research Area in Pisa, Italy, in September 2009. The EuroPKI workshop series focuses on all research and practice aspects of public key infrastructures, services and applications, and welcomes original research papers and excellent survey contributions from academia, government, and industry. Previous events of the series were held in: Samos, Greece (2004); Kent, UK (2005); Turin, Italy, (2006); Palma de Mallorca, Spain, (2007); and Trondheim, Norway (2008). From the original focus on public key infrastructures, EuroPKI interests - panded to include advanced cryptographic techniques, applications and (more generally) services. The Workshops brings together researchersfrom the cryp- graphiccommunity as well as fromthe applied security community, as witnessed by the interesting program. Indeed, this volume holds 18 refereed papers and the presentation paper by the invited speaker, Alexander Dent. In response to the EuroPKI 2009 call for papers, a total of 40 submissions were received. All submissions underwent a thorough blind review by at least three ProgramCommittee members, resulting in careful selection and revision of the accepted papers. After the conference, the papers were revised and improved by the authors before inclusion in this volume.
Les mer
Constitutes the refereed post-conference proceedings of the 6th European Workshop on Public Key Services, Applications and Infrastructures, EuroPKI 2009, held in Pisa, Italy, in September 2009.
Certificateless Encryption.- A Brief Introduction to Certificateless Encryption Schemes and Their Infrastructures.- Certificates and Revocation.- A Computational Framework for Certificate Policy Operations.- Resource Management with X.509 Inter-domain Authorization Certificates (InterAC).- Reducing the Cost of Certificate Revocation: A Case Study.- Cryptographic Protocols.- Automatic Generation of Sigma-Protocols.- A Secure and Efficient Authenticated Diffie–Hellman Protocol.- Key Management for Large-Scale Distributed Storage Systems.- PKI in Practice.- Nationwide PKI Testing – Ensuring Interoperability of OCSP Server and Client Implementations Early during Component Tests.- On Device Identity Establishment and Verification.- ABUSE: PKI for Real-World Email Trust.- Encryption and Auctions.- Public-Key Encryption with Registered Keyword Search.- Practicalization of a Range Test and Its Application to E-Auction.- Timed-Ephemerizer: Make Assured Data Appear and Disappear.- Reputation and User Aspects.- Privacy and Liveliness for Reputation Systems.- A Multidimensional Reputation Scheme for Identity Federations.- On the Usability of User Interfaces for Secure Website Authentication in Browsers.- Digital Signatures.- Validity Models of Electronic Signatures and Their Enforcement in Practice.- Biometric Identity Based Signature Revisited.- How to Construct Identity-Based Signatures without the Key Escrow Problem.
Les mer
State-of-the-art research Fast-track conference proceedings Unique visibility

Produktdetaljer

ISBN
9783642164408
Publisert
2010-10-25
Utgiver
Vendor
Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Aldersnivå
Research, P, 06
Språk
Product language
Engelsk
Format
Product format
Heftet