03493nam 2200613 a 450 991048327040332120200520144314.01-280-38993-197866135678573-642-16441-210.1007/978-3-642-16441-5(CKB)2550000000019893(SSID)ssj0000446726(PQKBManifestationID)11291915(PQKBTitleCode)TC0000446726(PQKBWorkID)10497904(PQKB)11668454(DE-He213)978-3-642-16441-5(MiAaPQ)EBC3066021(PPN)149029888(EXLCZ)99255000000001989320100907d2010 uy 0engurnn#008mamaatxtccrPublic key infrastructures, services and applications 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009 : revised selected papers /Fabio Martinelli, Bart Preneel, (eds.)1st ed.New York Springer20101 online resource (X, 303 p. 41 illus.)Lecture notes in computer science,0302-9743 ;6391LNCS sublibrary. SL 4, Security and cryptologyBibliographic Level Mode of Issuance: Monograph3-642-16440-4 Includes bibliographical references and index.Certificateless Encryption -- A Brief Introduction to Certificateless Encryption Schemes and Their Infrastructures -- Certificates and Revocation -- A Computational Framework for Certificate Policy Operations -- Resource Management with X.509 Inter-domain Authorization Certificates (InterAC) -- Reducing the Cost of Certificate Revocation: A Case Study -- Cryptographic Protocols -- Automatic Generation of Sigma-Protocols -- A Secure and Efficient Authenticated Diffie–Hellman Protocol -- Key Management for Large-Scale Distributed Storage Systems -- PKI in Practice -- Nationwide PKI Testing – Ensuring Interoperability of OCSP Server and Client Implementations Early during Component Tests -- On Device Identity Establishment and Verification -- ABUSE: PKI for Real-World Email Trust -- Encryption and Auctions -- Public-Key Encryption with Registered Keyword Search -- Practicalization of a Range Test and Its Application to E-Auction -- Timed-Ephemerizer: Make Assured Data Appear and Disappear -- Reputation and User Aspects -- Privacy and Liveliness for Reputation Systems -- A Multidimensional Reputation Scheme for Identity Federations -- On the Usability of User Interfaces for Secure Website Authentication in Browsers -- Digital Signatures -- Validity Models of Electronic Signatures and Their Enforcement in Practice -- Biometric Identity Based Signature Revisited -- How to Construct Identity-Based Signatures without the Key Escrow Problem.Lecture notes in computer science ;6391.LNCS sublibrary.SL 4,Security and cryptology.Computer scienceInformation technologyComputer science.Information technology.005.8Martinelli Fabio600345Preneel Bart28507European PKI WorkshopMiAaPQMiAaPQMiAaPQBOOK9910483270403321Public key infrastructures, services and applications4198446UNINA