LEADER 03493nam 2200613 a 450 001 9910483270403321 005 20200520144314.0 010 $a1-280-38993-1 010 $a9786613567857 010 $a3-642-16441-2 024 7 $a10.1007/978-3-642-16441-5 035 $a(CKB)2550000000019893 035 $a(SSID)ssj0000446726 035 $a(PQKBManifestationID)11291915 035 $a(PQKBTitleCode)TC0000446726 035 $a(PQKBWorkID)10497904 035 $a(PQKB)11668454 035 $a(DE-He213)978-3-642-16441-5 035 $a(MiAaPQ)EBC3066021 035 $a(PPN)149029888 035 $a(EXLCZ)992550000000019893 100 $a20100907d2010 uy 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aPublic key infrastructures, services and applications $e6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009 : revised selected papers /$fFabio Martinelli, Bart Preneel, (eds.) 205 $a1st ed. 210 $aNew York $cSpringer$d2010 215 $a1 online resource (X, 303 p. 41 illus.) 225 1 $aLecture notes in computer science,$x0302-9743 ;$v6391 225 1 $aLNCS sublibrary. SL 4, Security and cryptology 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-16440-4 320 $aIncludes bibliographical references and index. 327 $aCertificateless Encryption -- A Brief Introduction to Certificateless Encryption Schemes and Their Infrastructures -- Certificates and Revocation -- A Computational Framework for Certificate Policy Operations -- Resource Management with X.509 Inter-domain Authorization Certificates (InterAC) -- Reducing the Cost of Certificate Revocation: A Case Study -- Cryptographic Protocols -- Automatic Generation of Sigma-Protocols -- A Secure and Efficient Authenticated Diffie?Hellman Protocol -- Key Management for Large-Scale Distributed Storage Systems -- PKI in Practice -- Nationwide PKI Testing ? Ensuring Interoperability of OCSP Server and Client Implementations Early during Component Tests -- On Device Identity Establishment and Verification -- ABUSE: PKI for Real-World Email Trust -- Encryption and Auctions -- Public-Key Encryption with Registered Keyword Search -- Practicalization of a Range Test and Its Application to E-Auction -- Timed-Ephemerizer: Make Assured Data Appear and Disappear -- Reputation and User Aspects -- Privacy and Liveliness for Reputation Systems -- A Multidimensional Reputation Scheme for Identity Federations -- On the Usability of User Interfaces for Secure Website Authentication in Browsers -- Digital Signatures -- Validity Models of Electronic Signatures and Their Enforcement in Practice -- Biometric Identity Based Signature Revisited -- How to Construct Identity-Based Signatures without the Key Escrow Problem. 410 0$aLecture notes in computer science ;$v6391. 410 0$aLNCS sublibrary.$nSL 4,$pSecurity and cryptology. 606 $aComputer science 606 $aInformation technology 615 0$aComputer science. 615 0$aInformation technology. 676 $a005.8 701 $aMartinelli$b Fabio$0600345 701 $aPreneel$b Bart$028507 712 12$aEuropean PKI Workshop 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483270403321 996 $aPublic key infrastructures, services and applications$94198446 997 $aUNINA