Public Key Infrastructure: First European PKI Workshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004. Proceedings [1 ed.]
3540222162, 9783540222163, 9783540259800
This book constitutes the refereed proceedings of the First European Public Key Infrastructure Workshop: Research and Ap
Table of contents : Front Matter....Pages - Introduction to the Belgian EID Card....Pages 1-13 The EuroPKI Experience....Pages 14-27 CERVANTES – A Certificate Validation Test-Bed....Pages 28-42 Flexible and Scalable Public Key Security for SSH....Pages 43-56 What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved....Pages 57-70 Identity-Based Cryptography in Public Key Management....Pages 71-84 Pre-production Methods of a Response to Certificates with the Common Status –Design and Theoretical Evaluation–....Pages 85-97 Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures....Pages 98-111 A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications....Pages 112-125 Using LDAP Directories for Management of PKI Processes....Pages 126-134 Recursive Certificate Structures for X.509 Systems....Pages 135-148 A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions....Pages 149-159 A Practical Approach of X.509 Attribute Certificate Framework as Support to Obtain Privilege Delegation....Pages 160-172 TACAR: a Simple and Fast Way for Building Trust among PKIs....Pages 173-179 On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments....Pages 180-190 A Socially Inspired Reputation Model....Pages 191-204 Using EMV Cards for Single Sign-On....Pages 205-217 Distributing Security-Mediated PKI....Pages 218-231 Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography....Pages 232-245 ÆTHER: an Authorization Management Architecture for Ubiquitous Computing....Pages 246-259 Trustworthy Accounting for Wireless LAN Sharing Communities....Pages 260-273 Mobile Qualified Electronic Signatures and Certification on Demand....Pages 274-286 Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks....Pages 287-296 A Credential Conversion Service for SAML-based Scenarios....Pages 297-305 A New Design of Privilege Management Infrastructure with Binding Signature Semantics....Pages 306-313 How to Qualify Electronic Signatures and Time Stamps....Pages 314-321 An Efficient Revocation Scheme for Stateless Receivers....Pages 322-334 On the Use of Weber Polynomials in Elliptic Curve Cryptography....Pages 335-349 Threshold Password-Based Authentication Using Bilinear Pairings....Pages 350-363 An Efficient Group Key Management Scheme for Secure Multicast with Multimedia Applications....Pages 364-378 Back Matter....Pages -