default search action
IWAP 2005: Singapore
- Jianying Zhou, Meng-Chow Kang, Feng Bao, HweeHwa Pang:
Applied Public Key Infrastructure - 4th International Workshop: IWAP 2005, Singapore, September 21-23, 2005. Frontiers in Artificial Intelligence and Applications 128, IOS Press 2005, ISBN 978-1-58603-550-1
PKI Operation & Case Study
- Geraint Price:
PKI Challenges: An Industry Analysis. 3-16 - Marcus Lippert, Evangelos G. Karatsiolis, Alexander Wiesmaier, Johannes Buchmann:
Directory Based Registration in Public Key Infrastructures. 17-32 - Erhan J. Kartaltepe, Shouhuai Xu:
On Automatically Detecting Malicious Impostor Emails. 33-47
Non-Repudiation
- Guilin Wang:
Generic Fair Non-Repudiation Protocols with Transparent Off-line TTP. 51-65 - Richard W. C. Lui, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Efficient Authorization in Delegation Chains with Strong Non-Repudiation. 66-77 - Nicolás González-Deleito:
No Author-Based Selective Receipt in Certified Email with Tight Trust Requirements. 78-91
Authorization & Access Control
- Shuhong Wang, Yingjiu Li, Bo Zhu, Nan Hu:
A Generic Protocol for Controlling Access to Mobile Services. 95-110 - Gabriel López, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta:
Use of XACML Policies for a Network Access Control Service. 111-122 - Chunhua Gu, Xueqin Zhang, Guoxin Song:
A Delegation Logic Based Authorization Mechanism for Virtual Organizations. 123-136
Authentication & Time-Stamping
- Deholo Nali, Carlisle Adams, Ali Miri:
An Efficient and Flexible Scheme to Support Biometric-Based and Role-Based Access Control. 139-154 - Yoshifumi Ueshige, Kouichi Sakurai:
A Study on a Framework of Online Biometric Authentication with Verification of Personal Repository. 155-168 - Toshihiko Matsuo, Shin'ichiro Matsuo:
On Universal Composable Security of Time-Stamping Protocols. 169-181
Certificate Validation & Revocation
- A. Lakshminarayanan:
Augmented CRL Scheme. 185-196 - Shingo Hane, Takahiro Fujishiro, Yoko Hashimoto, Tadashi Kaji, Kondo Katsuhiko, Satoru Tezuka:
Speeding up X.509 Certificate Path Validation. 197-206 - M. Francisca Hinarejos, Jordi Forné:
A Lightweight Delegated Privileges Revocation Scheme Based on Coding. 207-221
Cryptographic Applications
- Marek Klonowski, Miroslaw Kutylowski, Bartlomiej Rózanski:
Hiding Data Sources in P2P Networks. 225-239 - Yi Mu, Willy Susilo, Xinyi Huang:
Efficient Broadcast from Trapdoor Functions. 240-248 - Rui Xue, Dawn Song, Zhenfeng Zhang, Dengguo Feng:
A Generic Scheme for Zero-Knowledge Sets. 249-263
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.