{"title":"Authorization Architectures for Privacy-Respecting Surveillance","authors":"U. Flegel, M. Meier","doi":"10.1007/978-3-540-73408-6_1","DOIUrl":"https://doi.org/10.1007/978-3-540-73408-6_1","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117041997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anonymous k -Show Credentials","authors":"M. Layouni, H. Vangheluwe","doi":"10.1007/978-3-540-73408-6_13","DOIUrl":"https://doi.org/10.1007/978-3-540-73408-6_13","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"780 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123898380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Li, Guomin Yang, D. Wong, Xiaotie Deng, Sherman S. M. Chow
{"title":"An Efficient Signcryption Scheme with Key Privacy","authors":"C. Li, Guomin Yang, D. Wong, Xiaotie Deng, Sherman S. M. Chow","doi":"10.1007/978-3-540-73408-6_6","DOIUrl":"https://doi.org/10.1007/978-3-540-73408-6_6","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133581823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AutoPKI: A PKI Resources Discovery System","authors":"Massimiliano Pala, Sean W. Smith","doi":"10.1007/978-3-540-73408-6_11","DOIUrl":"https://doi.org/10.1007/978-3-540-73408-6_11","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124351127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiguo Li, Xinyi Huang, Y. Mu, W. Susilo, Qianhong Wu
{"title":"Certificate-Based Signature: Security Model and Efficient Construction","authors":"Jiguo Li, Xinyi Huang, Y. Mu, W. Susilo, Qianhong Wu","doi":"10.1007/978-3-540-73408-6_8","DOIUrl":"https://doi.org/10.1007/978-3-540-73408-6_8","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129267467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manuel Sánchez, Gabriel López Millán, Óscar Cánovas Reverte, A. Gómez-Skarmeta
{"title":"Bootstrapping a Global SSO from Network Access Control Mechanisms","authors":"Manuel Sánchez, Gabriel López Millán, Óscar Cánovas Reverte, A. Gómez-Skarmeta","doi":"10.1007/978-3-540-73408-6_12","DOIUrl":"https://doi.org/10.1007/978-3-540-73408-6_12","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127899398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two Worlds, One Smart Card: An Integrated Solution for Physical Access and Logical Security Using PKI on a Single Smart Card","authors":"J. Hoepman, G. Kleinhuis","doi":"10.1007/978-3-540-73408-6_17","DOIUrl":"https://doi.org/10.1007/978-3-540-73408-6_17","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127142048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}