Stop the war!
Остановите войну!
for scientists:
default search action
1. EuroPKI 2004: Samos Island, Greece
- Sokratis K. Katsikas, Stefanos Gritzalis, Javier López:
Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings. Lecture Notes in Computer Science 3093, Springer 2004, ISBN 3-540-22216-2 - Danny De Cock, Karel Wouters, Bart Preneel:
Introduction to the Belgian EID Card: BELPIC. 1-13 - Antonio Lioy, Marius Marian, Natalia Moltchanova, Massimiliano Pala:
The EuroPKI Experience. 14-27 - Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano:
CERVANTES - A Certificate Validation Test-Bed. 28-42 - Yasir Ali, Sean W. Smith:
Flexible and Scalable Public Key Security for SSH. 43-56 - Benoît Libert, Jean-Jacques Quisquater:
What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved. 57-70 - Dae Hyun Yum, Pil Joong Lee:
Identity-Based Cryptography in Public Key Management. 71-84 - Satoshi Koga, Jae-Cheol Ryou, Kouichi Sakurai:
Pre-production Methods of a Response to Certificates with the Common Status - Design and Theoretical Evaluation. 85-97 - Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone:
Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures. 98-111 - Tobias Straub, Harald Baier:
A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications. 112-125 - Vangelis Karatsiolis, Marcus Lippert, Alexander Wiesmaier:
Using LDAP Directories for Management of PKI Processes. 126-134 - Selwyn Russell:
Recursive Certificate Structures for X.509 Systems. 135-148 - Agapios N. Platis, Costas Lambrinoudakis, Assimakis K. Leros:
A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions. 149-159 - José A. Montenegro, Fernando Moya:
A Practical Approach of X.509 Attribute Certificate Framework as Support to Obtain Privilege Delegation. 160-172 - Diego R. López, Chelo Malagon, Licia Florio:
TACAR: a Simple and Fast Way for Building Trust among PKIs. 173-179 - Josep Domingo-Ferrer:
On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments. 180-190 - Nicola Mezzetti:
A Socially Inspired Reputation Model. 191-204 - Andreas Pashalidis, Chris J. Mitchell:
Using EMV Cards for Single Sign-On. 205-217 - Gabriel Vanrenen, Sean W. Smith:
Distributing Security-Mediated PKI. 218-231 - Charikleia Zouridaki, Brian L. Mark, Kris Gaj, Roshan K. Thomas:
Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography. 232-245 - Patroklos G. Argyroudis, Donal O'Mahony:
ÆTHER: an Authorization Management Architecture for Ubiquitous Computing. 246-259 - Elias C. Efstathiou, George C. Polyzos:
Trustworthy Accounting for Wireless LAN Sharing Communities. 260-273 - Heiko Rossnagel:
Mobile Qualified Electronic Signatures and Certification on Demand. 274-286 - Georgios Kambourakis, Angelos N. Rouskas, Dimitris Gritzalis:
Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks. 287-296 - Óscar Cánovas Reverte, Gabriel López, Antonio Fernandez Gómez-Skarmeta:
A Credential Conversion Service for SAML-based Scenarios. 297-305 - Kemal Bicakci, Nazife Baykal:
A New Design of Privilege Management Infrastructure with Binding Signature Semantics. 306-313 - Detlef Hühnlein:
How to Qualify Electronic Signatures and Time Stamps. 314-321 - Yong Ho Hwang, Chong Hee Kim, Pil Joong Lee:
An Efficient Revocation Scheme for Stateless Receivers. 322-334 - Elisavet Konstantinou, Yannis C. Stamatiou, Christos D. Zaroliagis:
On the Use of Weber Polynomials in Elliptic Curve Cryptography. 335-349 - Songwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Kim, So Ran Ine:
Threshold Password-Based Authentication Using Bilinear Pairings. 350-363 - Chang N. Zhang, Zheng Li:
An Efficient Group Key Management Scheme for Secure Multicast with Multimedia Applications. 364-378
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.