default search action
2. EuroPKI 2005: Canterbury, UK
- David W. Chadwick, Gansen Zhao:
Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3545, Springer 2005, ISBN 3-540-28062-6
Authorisation
- Tobias Straub, Thilo-Alexander Ginkel, Johannes Buchmann:
A Multipurpose Delegation Proxy for WWW Credentials. 1-21 - Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Secure Role Activation and Authorization in the Enterprise Environment. 22-35 - Jesus Luna, Manel Medina, Oscar Manso:
Towards a Unified Authentication and Authorization Infrastructure for Grid Services: Implementing an Enhanced OCSP Service Provider into GT4. 36-54
Interoperability
- Gabriel López Millán, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Sassa Otenko, David W. Chadwick:
A Heterogeneous Network Access Service Based on PERMIS and SAML. 55-72 - Geraint Price, Chris J. Mitchell:
Interoperation Between a Conventional PKI and an ID-Based Infrastructure. 73-85 - Guillermo Álvaro, Stephen Farrell, Tommy Lindberg, Roland Lockhart, Yunhao Zhang:
XKMS Working Group Interoperability Status Report. 86-99
Evaluating a CA
- Valentina Casola, Antonino Mazzeo, Nicola Mazzocca, Massimiliano Rak:
An Innovative Policy-Based Cross Certification Methodology for Public Key Infrastructures. 100-117 - John Marchesini, Sean W. Smith:
Modeling Public Key Infrastructures in the Real World. 118-134 - Javier López, Rolf Oppliger, Günther Pernul:
Classifying Public Key Certificates. 135-143
ID Based Ring Signatures
- Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Identity Based Ring Signature: Why, How and What Next. 144-161
Practical Implementations
- Wensheng Xu, David W. Chadwick, Sassa Otenko:
Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache Server. 162-179 - Mark Franklin, Kevin Mitcham, Sean W. Smith, Joshua Stabiner, Omen Wild:
CA-in-a-Box. 180-190
New Protocols
- SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange. 191-205 - Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong:
Recoverable and Untraceable E-Cash. 206-214
Risks and Attacks
- YoungGyo Lee, Injung Kim, Seungjoo Kim, Dongho Won:
A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS. 215-226 - Adil Alsaid, Chris J. Mitchell:
Installing Fake Root Keys in a PC. 227-239
Long Term Archiving
- Aleksej Jerman Blazic, Peter Sylvester:
Provision of Long-Term Archiving Service for Digitally Signed Documents Using an Archive Interaction Protocol. 240-254 - Andreas U. Schmidt, Zbynek Loebl:
Legal Security for Transformations of Signed Documents: Fundamental Concepts. 255-270
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.