{"title":"On the Robustness of Applications Based on the SSL and TLS Security Protocols","authors":"D. Berbecaru, A. Lioy","doi":"10.1007/978-3-540-73408-6_18","DOIUrl":"https://doi.org/10.1007/978-3-540-73408-6_18","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127131400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-Preserving Revocation Checking with Modified CRLs","authors":"M. Narasimha, G. Tsudik","doi":"10.1007/978-3-540-73408-6_2","DOIUrl":"https://doi.org/10.1007/978-3-540-73408-6_2","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130993685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Satizábal, R. Martínez-Peláez, J. Forné, F. Rico-Novella
{"title":"Reducing the Computational Cost of Certification Path Validation in Mobile Payment","authors":"C. Satizábal, R. Martínez-Peláez, J. Forné, F. Rico-Novella","doi":"10.1007/978-3-540-73408-6_20","DOIUrl":"https://doi.org/10.1007/978-3-540-73408-6_20","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128035465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"One-More Extension of Paillier Inversion Problem and Concurrent Secure Identification","authors":"Yan Song","doi":"10.1007/978-3-540-73408-6_5","DOIUrl":"https://doi.org/10.1007/978-3-540-73408-6_5","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127557659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Variant for an Attack Against RSA Signature Verification Using Parameter Field","authors":"Y. Oiwa, K. Kobara, Hajime Watanabe","doi":"10.1007/978-3-540-73408-6_10","DOIUrl":"https://doi.org/10.1007/978-3-540-73408-6_10","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130882900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-Passports as a Means Towards the First World-Wide Public Key Infrastructure","authors":"D. Lekkas, D. Gritzalis","doi":"10.1007/978-3-540-73408-6_3","DOIUrl":"https://doi.org/10.1007/978-3-540-73408-6_3","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122944463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anonymous Identification and Designated-Verifiers Signatures from Insecure Batch Verification","authors":"Sherman S. M. Chow, D. Wong","doi":"10.1007/978-3-540-73408-6_15","DOIUrl":"https://doi.org/10.1007/978-3-540-73408-6_15","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115902514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Partial Anonymity in Secret Sharing","authors":"Vanesa Daza, J. Domingo-Ferrer","doi":"10.1007/978-3-540-73408-6_14","DOIUrl":"https://doi.org/10.1007/978-3-540-73408-6_14","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121916946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applicability of Public Key Infrastructures in Wireless Sensor Networks","authors":"R. Román, Cristina Alcaraz","doi":"10.1007/978-3-540-73408-6_22","DOIUrl":"https://doi.org/10.1007/978-3-540-73408-6_22","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126244185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}