{"title":"Uncertainty in Intrusion Detection Signaling Games","authors":"I. Kantzavelou, S. Katsikas","doi":"10.1007/978-3-642-53997-8_12","DOIUrl":"https://doi.org/10.1007/978-3-642-53997-8_12","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115064958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"STUNT: A Simple, Transparent, User-Centered Network of Trust","authors":"Klaus Potzmader, Johannes Winter, Daniel M. Hein","doi":"10.1007/978-3-642-53997-8_5","DOIUrl":"https://doi.org/10.1007/978-3-642-53997-8_5","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"276 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131532915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Johannes Braun, Franziskus Kiefer, Andreas Hülsing
{"title":"Revocation and Non-repudiation: When the First Destroys the Latter","authors":"Johannes Braun, Franziskus Kiefer, Andreas Hülsing","doi":"10.1007/978-3-642-53997-8_3","DOIUrl":"https://doi.org/10.1007/978-3-642-53997-8_3","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128435876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Johannes Braun, Florian Volk, J. Buchmann, M. Mühlhäuser
{"title":"Trust Views for the Web PKI","authors":"Johannes Braun, Florian Volk, J. Buchmann, M. Mühlhäuser","doi":"10.1007/978-3-642-53997-8_9","DOIUrl":"https://doi.org/10.1007/978-3-642-53997-8_9","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114509425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures","authors":"C. Brzuska, H. C. Pöhls, Kai Samelin","doi":"10.1007/978-3-642-53997-8_2","DOIUrl":"https://doi.org/10.1007/978-3-642-53997-8_2","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124614387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sébastien Canard, Iwen Coisel, Amandine Jambert, Jacques Traoré
{"title":"New Results for the Practical Use of Range Proofs","authors":"Sébastien Canard, Iwen Coisel, Amandine Jambert, Jacques Traoré","doi":"10.1007/978-3-642-53997-8_4","DOIUrl":"https://doi.org/10.1007/978-3-642-53997-8_4","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130889738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Felipe Carlos Werlang, Ricardo Felipe Custódio, M. Vigil
{"title":"A User-Centric Digital Signature Scheme","authors":"Felipe Carlos Werlang, Ricardo Felipe Custódio, M. Vigil","doi":"10.1007/978-3-642-53997-8_10","DOIUrl":"https://doi.org/10.1007/978-3-642-53997-8_10","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"492 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116324943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Partial Model Checking for the Verification and Synthesis of Secure Service Compositions","authors":"F. Martinelli, I. Matteucci","doi":"10.1007/978-3-642-53997-8_1","DOIUrl":"https://doi.org/10.1007/978-3-642-53997-8_1","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131343662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Test-Bed for Intrusion Detection Systems Results Post-processing","authors":"G. Spathoulas, S. Katsikas, Anastasios Charoulis","doi":"10.1007/978-3-642-53997-8_11","DOIUrl":"https://doi.org/10.1007/978-3-642-53997-8_11","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"452 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133775128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}