Stop the war!
Остановите войну!
for scientists:
default search action
7. EuroPKI 2010: Athens, Greece
- Jan Camenisch, Costas Lambrinoudakis:
Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers. Lecture Notes in Computer Science 6711, Springer 2011, ISBN 978-3-642-22632-8
Session 1: Authentication Mechanisms
- Massimiliano Pala, Sara Sinclair, Sean W. Smith:
PorKI: Portable PKI Credentials via Proxy Certificates. 1-16 - Yamin Wen, Fangguo Zhang:
A New Revocable Secret Handshake Scheme with Backward Unlinkability. 17-30 - Foivos F. Demertzis, Christos Xenakis:
SOMA: Self-Organised Mesh Authentication. 31-44
Session 2: Privacy Preserving Techniques
- Jangseong Kim, Joonsang Baek, Kwangjo Kim, Jianying Zhou:
A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments. 45-60 - Florian Kerschbaum, Alessandro Sorniotti:
Searchable Encryption for Outsourced Data Analytics. 61-76
Session 3: PKI and PKC Applications
- Keita Emura, Atsuko Miyaji, Kazumasa Omote:
An Identity-Based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-List System. 77-92 - David Gray, Caroline Sheedy:
E-Voting: A New Approach Using Double-Blind Identity-Based Encryption. 93-108 - Rafael Accorsi:
BBox: A Distributed Secure Log Architecture. 109-124
Session 4: Electronic Signature Schemes
- Somayeh Heidarvand, Jorge L. Villar:
A Fair and Abuse-Free Contract Signing Protocol from Boneh-Boyen Signature. 125-140 - Swarun Kumar, Shivank Agrawal, Subha Balaraman, C. Pandu Rangan:
Attribute Based Signatures for Bounded Multi-level Threshold Circuits. 141-154
Session 5: Identity Management
- Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens:
User-Centric Identity Management Using Trusted Modules. 155-170 - Prokopios Drogkaris, Stefanos Gritzalis:
Attaching Multiple Personal Identifiers in X.509 Digital Certificates. 171-177
Session 6: PKI and PKC Applications
- Moez Ben MBarka, Julien P. Stern:
Observations on Certification Authority Key Compromise. 178-192 - Thiago Acórdi Ramos, Nelson da Silva, Lau Cheuk Lung, Jonathan Gehard Kohler, Ricardo Felipe Custódio:
An Infrastructure for Long-Term Archiving of Authenticated and Sensitive Electronic Documents. 193-207
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.