LEADER 05869nam 22009015 450 001 9910483270403321 005 20251226195158.0 010 $a1-280-38993-1 010 $a9786613567857 010 $a3-642-16441-2 024 7 $a10.1007/978-3-642-16441-5 035 $a(CKB)2550000000019893 035 $a(SSID)ssj0000446726 035 $a(PQKBManifestationID)11291915 035 $a(PQKBTitleCode)TC0000446726 035 $a(PQKBWorkID)10497904 035 $a(PQKB)11668454 035 $a(DE-He213)978-3-642-16441-5 035 $a(MiAaPQ)EBC3066021 035 $a(PPN)149029888 035 $a(BIP)32335424 035 $a(EXLCZ)992550000000019893 100 $a20101015d2010 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aPublic Key Infrastructures, Services and Applications $e6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers /$fedited by Fabio Martinelli, Bart Preneel 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (X, 303 p. 41 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v6391 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-16440-4 320 $aIncludes bibliographical references and index. 327 $aCertificateless Encryption -- A Brief Introduction to Certificateless Encryption Schemes and Their Infrastructures -- Certificates and Revocation -- A Computational Framework for Certificate Policy Operations -- Resource Management with X.509 Inter-domain Authorization Certificates (InterAC) -- Reducing the Cost of Certificate Revocation: A Case Study -- Cryptographic Protocols -- Automatic Generation of Sigma-Protocols -- A Secure and Efficient Authenticated Diffie?Hellman Protocol -- Key Management for Large-Scale Distributed Storage Systems -- PKI in Practice -- Nationwide PKI Testing ? Ensuring Interoperability of OCSP Server and Client Implementations Early during Component Tests -- On Device Identity Establishment and Verification -- ABUSE: PKI for Real-World Email Trust -- Encryption and Auctions -- Public-Key Encryption with Registered Keyword Search -- Practicalization of a Range Test and Its Application to E-Auction -- Timed-Ephemerizer: Make Assured Data Appear and Disappear -- Reputation and User Aspects -- Privacy and Liveliness for Reputation Systems -- A Multidimensional Reputation Scheme for Identity Federations -- On the Usability of User Interfaces for Secure Website Authentication in Browsers -- Digital Signatures -- Validity Models of Electronic Signatures and Their Enforcement in Practice -- Biometric Identity Based Signature Revisited -- How to Construct Identity-Based Signatures without the Key Escrow Problem. 330 $aThisbookcontainsthepostproceedingsofthe6thEuropeanWorkshoponPublic Key Services, Applications and Infrastructures, which was held at the CNR Research Area in Pisa, Italy, in September 2009. The EuroPKI workshop series focuses on all research and practice aspects of public key infrastructures, services and applications, and welcomes original research papers and excellent survey contributions from academia, government, and industry. Previous events of the series were held in: Samos, Greece (2004); Kent, UK (2005); Turin, Italy, (2006); Palma de Mallorca, Spain, (2007); and Trondheim, Norway (2008). From the original focus on public key infrastructures, EuroPKI interests - panded to include advanced cryptographic techniques, applications and (more generally) services. The Workshops brings together researchersfrom the cryp- graphiccommunity as well as fromthe applied security community, as witnessed by the interesting program. Indeed, this volume holds 18 refereed papers and the presentation paper by the invited speaker, Alexander Dent. In response to the EuroPKI 2009 call for papers, a total of 40 submissions were received. All submissions underwent a thorough blind review by at least three ProgramCommittee members, resulting in careful selection and revision of the accepted papers. After the conference, the papers were revised and improved by the authors before inclusion in this volume. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v6391 606 $aComputer networks 606 $aUser interfaces (Computer systems) 606 $aHuman-computer interaction 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic data processing$xManagement 606 $aAlgorithms 606 $aComputers and civilization 606 $aComputer Communication Networks 606 $aUser Interfaces and Human Computer Interaction 606 $aCryptology 606 $aIT Operations 606 $aAlgorithms 606 $aComputers and Society 615 0$aComputer networks. 615 0$aUser interfaces (Computer systems). 615 0$aHuman-computer interaction. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aElectronic data processing$xManagement. 615 0$aAlgorithms. 615 0$aComputers and civilization. 615 14$aComputer Communication Networks. 615 24$aUser Interfaces and Human Computer Interaction. 615 24$aCryptology. 615 24$aIT Operations. 615 24$aAlgorithms. 615 24$aComputers and Society. 676 $a005.8 701 $aMartinelli$b Fabio$0600345 701 $aPreneel$b Bart$028507 712 12$aEuropean PKI Workshop. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483270403321 996 $aPublic key infrastructures, services and applications$94198446 997 $aUNINA