{"title":"What Public Keys Can Do for 3-Party, Password-Authenticated Key Exchange","authors":"Jean Lancrenon","doi":"10.1007/978-3-642-53997-8_6","DOIUrl":"https://doi.org/10.1007/978-3-642-53997-8_6","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131239798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non-interactive Public Accountability for Sanitizable Signatures","authors":"C. Brzuska, H. C. Pöhls, Kai Samelin","doi":"10.1007/978-3-642-40012-4_12","DOIUrl":"https://doi.org/10.1007/978-3-642-40012-4_12","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125477359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Waltzing the Bear, or: A Trusted Virtual Security Module","authors":"Ronald Toegl, Florian Reimair, Martin Pirker","doi":"10.1007/978-3-642-40012-4_10","DOIUrl":"https://doi.org/10.1007/978-3-642-40012-4_10","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122084610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Masaya Yasuda, Jun Yajima, Takeshi Shimoyama, Jun Kogure
{"title":"Analysis of Lattice Reduction Attack against the Somewhat Homomorphic Encryption Based on Ideal Lattices","authors":"Masaya Yasuda, Jun Yajima, Takeshi Shimoyama, Jun Kogure","doi":"10.1007/978-3-642-40012-4_1","DOIUrl":"https://doi.org/10.1007/978-3-642-40012-4_1","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117097194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GeoPKI: Converting Spatial Trust into Certificate Trust","authors":"T. Kim, V. Gligor, A. Perrig","doi":"10.1007/978-3-642-40012-4_9","DOIUrl":"https://doi.org/10.1007/978-3-642-40012-4_9","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128990246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to Bootstrap Trust among Devices in Wireless Environments via EAP-STLS","authors":"Massimiliano Pala","doi":"10.1007/978-3-642-40012-4_7","DOIUrl":"https://doi.org/10.1007/978-3-642-40012-4_7","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115870630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Lyle, Andrew J. Paverd, J. King-Lacroix, Andrea S. Atzeni, Habib Virji, I. Flechais, Shamal Faily
{"title":"Personal PKI for the Smart Device Era","authors":"J. Lyle, Andrew J. Paverd, J. King-Lacroix, Andrea S. Atzeni, Habib Virji, I. Flechais, Shamal Faily","doi":"10.1007/978-3-642-40012-4_5","DOIUrl":"https://doi.org/10.1007/978-3-642-40012-4_5","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134095997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Vigil, Cristian Thiago Moecke, Ricardo Felipe Custódio, M. Volkamer
{"title":"The Notary Based PKI - A Lightweight PKI for Long-Term Signatures on Documents","authors":"M. Vigil, Cristian Thiago Moecke, Ricardo Felipe Custódio, M. Volkamer","doi":"10.1007/978-3-642-40012-4_6","DOIUrl":"https://doi.org/10.1007/978-3-642-40012-4_6","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131089451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cross-Unlinkable Hierarchical Group Signatures","authors":"J. Bringer, H. Chabanne, Alain Patey","doi":"10.1007/978-3-642-40012-4_11","DOIUrl":"https://doi.org/10.1007/978-3-642-40012-4_11","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121847814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}