LEADER 06124nam 22008415 450 001 996466235703316 005 20200702164816.0 010 $a3-540-25980-5 024 7 $a10.1007/b98201 035 $a(CKB)1000000000212426 035 $a(DE-He213)978-3-540-25980-0 035 $a(SSID)ssj0000230447 035 $a(PQKBManifestationID)11198653 035 $a(PQKBTitleCode)TC0000230447 035 $a(PQKBWorkID)10196850 035 $a(PQKB)11570654 035 $a(MiAaPQ)EBC3087599 035 $a(PPN)155192906 035 $a(EXLCZ)991000000000212426 100 $a20121227d2004 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPublic Key Infrastructure$b[electronic resource] $eFirst European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings /$fedited by Sokratis K. Katsikas, Stefanos Gritzalis 205 $a1st ed. 2004. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2004. 215 $a1 online resource (XIV, 386 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v3093 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-22216-2 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $ato the Belgian EID Card -- The EuroPKI Experience -- CERVANTES ? A Certificate Validation Test-Bed -- Flexible and Scalable Public Key Security for SSH -- What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved -- Identity-Based Cryptography in Public Key Management -- Pre-production Methods of a Response to Certificates with the Common Status ?Design and Theoretical Evaluation? -- Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures -- A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications -- Using LDAP Directories for Management of PKI Processes -- Recursive Certificate Structures for X.509 Systems -- A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions -- A Practical Approach of X.509 Attribute Certificate Framework as Support to Obtain Privilege Delegation -- TACAR: a Simple and Fast Way for Building Trust among PKIs -- On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments -- A Socially Inspired Reputation Model -- Using EMV Cards for Single Sign-On -- Distributing Security-Mediated PKI -- Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography -- ĘTHER: an Authorization Management Architecture for Ubiquitous Computing -- Trustworthy Accounting for Wireless LAN Sharing Communities -- Mobile Qualified Electronic Signatures and Certification on Demand -- Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks -- A Credential Conversion Service for SAML-based Scenarios -- A New Design of Privilege Management Infrastructure with Binding Signature Semantics -- How to Qualify Electronic Signatures and Time Stamps -- An Efficient Revocation Scheme for Stateless Receivers -- On the Use of Weber Polynomials in Elliptic Curve Cryptography -- Threshold Password-Based Authentication Using Bilinear Pairings -- An Efficient Group Key Management Scheme for Secure Multicast with Multimedia Applications. 330 $aThis book constitutes the refereed proceedings of the First European Public Key Infrastructure Workshop: Research and Applications, EuroPKI 2004, held on Samos Island, Greece in June 2004. The 25 revised full papers and 5 revised short papers presented were carefully reviewed and selected from 73 submissions. The papers address all current issues in PKI, ranging from theoretical and foundational topics to applications and regulatory issues in various contexts. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v3093 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aInformation storage and retrieval 606 $aApplication software 606 $aComputers and civilization 606 $aManagement information systems 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aData encryption (Computer science). 615 0$aAlgorithms. 615 0$aInformation storage and retrieval. 615 0$aApplication software. 615 0$aComputers and civilization. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aCryptology. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aInformation Storage and Retrieval. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aComputers and Society. 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aKatsikas$b Sokratis K$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGritzalis$b Stefanos$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aEuropean PKI Workshop 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466235703316 996 $aPublic Key Infrastructure$9772130 997 $aUNISA