Accepted Papers

LNCS 3093 is available online

Introduction to the Belgian EID Card
D. De Cock, K. Wouters, and B. Preneel

The EuroPKI Experience
A. Lioy, M. Marian, N. Moltchanova, and M. Pala

CERVANTES - A Certificate Validation Test-bed
J. L. Muñoz, J. Forne, O. Esparza, and M. Soriano

Flexible and Scalable Public Key Security for SSH
Y. Ali and S. Smith

What is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved
B. Libert and J. J. Quisquater

Identity-based Cryptography in Public Key Management
D. H. Yum and P. J. Lee

Pre-production Methods of a Response to Certificates with the Common Status -- Design and Theoretical Evaluation
S. Koga, J. C. Ryou, and K. Sakurai

Filling the Gap Between Requirements Engineering and Public Key/Trust Management Infrastructures
P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone

A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications
T. Straub and H. Baier

Using LDAP Directories for Management of PKI Processes
V. Karatsiolis, M. Lippert, and A. Wiesmaier

Recursive Certificate Structures for X.509 Systems
S. Russell

A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions
A. Platis, C. Lambrinoudakis, and A. Leros

A Practical Approach of X.509 Attribute Certificate Framework as Support to Obtain Privilege Delegation
J. A. Montenegro and F. Moya

TACAR - A Simple and Fast Way for Building Trust Among PKIs
D. Lopez, C. Malagon, and L. Florio

On the Synergy Between Certificate Verification Trees and PayTree-Like Micropayments
J. Domingo-Ferrer

A Socially Inspired Reputation Model
N. Mezzetti

Using EMV Cards for Single Sign-On
A. Pashalidis and C. Mitchell

Distributing Security-Mediated PKI
G. Vanrenen and S. Smith

Distributed CA-based PKI for Mobile Ad hoc Networks using Elliptic Curve Cryptography
C. Zouridaki, B. Mark, K. Gaj, and R. Thomas

AETHER - An Authorization Management Architecture for Ubiquitous Computing
P. Argyroudis and D. O'Mahony

Trustworthy Accounting for Wireless LAN Sharing Communities
E. Efstathiou and G. Polyzos

Mobile Qualified Electronic Signatures and Certification on Demand
H. Rossnagel

Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks
G. Kambourakis, A. Rouskas, and D. Gritzalis

A Credential Conversion Service for SAML-based Scenarios
O. Cánovas, G. López, and A. Gómez-Skarmeta

A New Design of Privilege Management Infrastructure with Binding Signature Semantics
K. Bicakci and N. Baykal

How to Qualify Electronic Signatures and Time Stamps
D. Huehnlein

An Efficient Revocation Scheme for Stateless Receivers
Y. H. Hwang, C. H. Kim, and P. J. Lee

On the Use of Weber Polynomials in Elliptic Curve Cryptography
E. Konstantinou, Y. Stamatiou, and C. Zaroliagis

Threshold Password-Based Authentication Using Bilinear Pairings
S. Lee, K. Han, S. Kang, K. Kim, and S. R. Ine

An Efficient Group Key Management Scheme for Secure Multicast with Multimedia Applications
C. N. Zhang and Z. Li

 

last updated: Apr 14th, 2004


Call for Papers     Important Dates     Registration    Workshop Program    Workshop Committees     Accepted Papers    Local Information     Contact Points