- Ton van Deursen, Sasa Radomirovic
:
Insider Attacks and Privacy of RFID Protocols. EuroPKI 2011: 91-105 - Flavio D. Garcia, Eric R. Verheul, Bart Jacobs:
Cell-Based Roadpricing. EuroPKI 2011: 106-122 - Kristian Gjøsteen, Øystein Thuen:
Password-Based Signatures. EuroPKI 2011: 17-33 - Peter Gutmann:
PKI as Part of an Integrated Risk Management Strategy for Web Security. EuroPKI 2011: 128-146 - Yutaka Kawai, Noboru Kunihiro
:
Secret Handshake Scheme with Request-Based-Revealing. EuroPKI 2011: 1-16 - Jean Lancrenon, Roland Gillard:
Isolating Partial Information of Indistinguishable Encryptions. EuroPKI 2011: 34-48 - Moez Ben MBarka, Julien P. Stern:
Certification Validation: Back to the Past. EuroPKI 2011: 159-175 - Olivier Pereira:
Ballot Aggregation and Mixnet Based Open-Audit Elections - (Extended Abstract). EuroPKI 2011: 123-127 - Mark Stegelmann, Dogan Kesdogan:
Design and Evaluation of a Privacy-Preserving Architecture for Vehicle-to-Grid Interaction. EuroPKI 2011: 75-90 - Johannes Winter, Kurt Dietrich:
A Hijacker's Guide to the LPC Bus. EuroPKI 2011: 176-193 - Jan Camenisch, Costas Lambrinoudakis:
Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers. Lecture Notes in Computer Science 6711, Springer 2011, ISBN 978-3-642-22632-8 [contents] - 2010
- Rafael Accorsi:
BBox: A Distributed Secure Log Architecture. EuroPKI 2010: 109-124 - Foivos F. Demertzis, Christos Xenakis
:
SOMA: Self-Organised Mesh Authentication. EuroPKI 2010: 31-44 - Prokopios Drogkaris, Stefanos Gritzalis
:
Attaching Multiple Personal Identifiers in X.509 Digital Certificates. EuroPKI 2010: 171-177 - Keita Emura
, Atsuko Miyaji
, Kazumasa Omote:
An Identity-Based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-List System. EuroPKI 2010: 77-92 - David Gray, Caroline Sheedy:
E-Voting: A New Approach Using Double-Blind Identity-Based Encryption. EuroPKI 2010: 93-108 - Somayeh Heidarvand, Jorge L. Villar
:
A Fair and Abuse-Free Contract Signing Protocol from Boneh-Boyen Signature. EuroPKI 2010: 125-140 - Florian Kerschbaum, Alessandro Sorniotti:
Searchable Encryption for Outsourced Data Analytics. EuroPKI 2010: 61-76 - Jangseong Kim, Joonsang Baek
, Kwangjo Kim, Jianying Zhou
:
A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments. EuroPKI 2010: 45-60 - Swarun Kumar
, Shivank Agrawal, Subha Balaraman, C. Pandu Rangan:
Attribute Based Signatures for Bounded Multi-level Threshold Circuits. EuroPKI 2010: 141-154 - Moez Ben MBarka, Julien P. Stern:
Observations on Certification Authority Key Compromise. EuroPKI 2010: 178-192 - Massimiliano Pala, Sara Sinclair, Sean W. Smith:
PorKI: Portable PKI Credentials via Proxy Certificates. EuroPKI 2010: 1-16 - Thiago Acórdi Ramos, Nelson da Silva, Lau Cheuk Lung, Jonathan Gehard Kohler, Ricardo Felipe Custódio:
An Infrastructure for Long-Term Archiving of Authenticated and Sensitive Electronic Documents. EuroPKI 2010: 193-207 - Jan Vossaert, Jorn Lapon
, Bart De Decker, Vincent Naessens:
User-Centric Identity Management Using Trusted Modules. EuroPKI 2010: 155-170 - Yamin Wen, Fangguo Zhang
:
A New Revocable Secret Handshake Scheme with Backward Unlinkability. EuroPKI 2010: 17-30 - Fabio Martinelli, Bart Preneel
:
Public Key Infrastructures, Services and Applications - 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers. Lecture Notes in Computer Science 6391, Springer 2010, ISBN 978-3-642-16440-8 [contents] - 2009
- Isaac Agudo
, M. Carmen Fernández Gago, Javier López
:
A Multidimensional Reputation Scheme for Identity Federations. EuroPKI 2009: 225-238 - Harald Baier, Vangelis Karatsiolis:
Validity Models of Electronic Signatures and Their Enforcement in Practice. EuroPKI 2009: 255-270 - Endre Bangerter, Thomas Briner, Wilko Henecka
, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider
:
Automatic Generation of Sigma-Protocols. EuroPKI 2009: 67-82 - Alexander W. Dent:
A Brief Introduction to Certificateless Encryption Schemes and Their Infrastructures. EuroPKI 2009: 1-16