Accepted Papers
Introduction to the Belgian EID Card
D. De Cock, K. Wouters, and B. Preneel
The EuroPKI Experience
A. Lioy, M. Marian, N. Moltchanova, and M. Pala
CERVANTES - A Certificate Validation Test-bed
J. L. Muñoz, J. Forne, O. Esparza, and M. Soriano
Flexible and Scalable Public Key Security for SSH
Y. Ali and S. Smith
What is Possible with Identity Based Cryptography for PKIs and What Still
Must Be Improved
B. Libert and J. J. Quisquater
Identity-based Cryptography in Public Key Management
D. H. Yum and P. J. Lee
Pre-production Methods of a Response to Certificates with the Common Status
-- Design and Theoretical Evaluation
S. Koga, J. C. Ryou, and K. Sakurai
Filling the Gap Between Requirements Engineering and Public Key/Trust
Management Infrastructures
P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone
A Framework for Evaluating the Usability and the Utility of PKI-enabled
Applications
T. Straub and H. Baier
Using LDAP Directories for Management of PKI Processes
V. Karatsiolis, M. Lippert, and A. Wiesmaier
Recursive Certificate Structures for X.509 Systems
S. Russell
A Probabilistic Model for Evaluating the Operational Cost of PKI-based
Financial Transactions
A. Platis, C. Lambrinoudakis, and A. Leros
A Practical Approach of X.509 Attribute Certificate Framework as Support to
Obtain Privilege Delegation
J. A. Montenegro and F. Moya
TACAR - A Simple and Fast Way for Building Trust Among PKIs
D. Lopez, C. Malagon, and L. Florio
On the Synergy Between Certificate Verification Trees and PayTree-Like
Micropayments
J. Domingo-Ferrer
A Socially Inspired Reputation Model
N. Mezzetti
Using EMV Cards for Single Sign-On
A. Pashalidis and C. Mitchell
Distributing Security-Mediated PKI
G. Vanrenen and S. Smith
Distributed CA-based PKI for Mobile Ad hoc Networks using Elliptic Curve
Cryptography
C. Zouridaki, B. Mark, K. Gaj, and R. Thomas
AETHER - An Authorization Management Architecture for Ubiquitous Computing
P. Argyroudis and D. O'Mahony
Trustworthy Accounting for Wireless LAN Sharing Communities
E. Efstathiou and G. Polyzos
Mobile Qualified Electronic Signatures and Certification on Demand
H. Rossnagel
Performance Evaluation of Certificate Based Authentication in Integrated
Emerging 3G and Wi-Fi Networks
G. Kambourakis, A. Rouskas, and D. Gritzalis
A Credential Conversion Service for SAML-based Scenarios
O. Cánovas, G. López, and A. Gómez-Skarmeta
A New Design of Privilege Management Infrastructure with Binding Signature
Semantics
K. Bicakci and N. Baykal
How to Qualify Electronic Signatures and Time Stamps
D. Huehnlein
An Efficient Revocation Scheme for Stateless Receivers
Y. H. Hwang, C. H. Kim, and P. J. Lee
On the Use of Weber Polynomials in Elliptic Curve Cryptography
E. Konstantinou, Y. Stamatiou, and C. Zaroliagis
Threshold Password-Based Authentication Using Bilinear Pairings
S. Lee, K. Han, S. Kang, K. Kim, and S. R. Ine
An Efficient Group Key Management Scheme for Secure Multicast with Multimedia
Applications
C. N. Zhang and Z. Li
last updated: Apr 14th, 2004
Call for Papers Important Dates Registration Workshop Program Workshop Committees Accepted Papers Local Information Contact Points