Abstract is missing.
- Introduction to the Belgian EID Card: BELPICDanny De Cock, Karel Wouters, Bart Preneel. 1-13 [doi]
- The EuroPKI ExperienceAntonio Lioy, Marius Marian, Natalia Moltchanova, Massimiliano Pala. 14-27 [doi]
- CERVANTES - A Certificate Validation Test-BedJose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano. 28-42 [doi]
- Flexible and Scalable Public Key Security for SSHYasir Ali, Sean Smith. 43-56 [doi]
- What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be ImprovedBenoît Libert, Jean-Jacques Quisquater. 57-70 [doi]
- Identity-Based Cryptography in Public Key ManagementDae Hyun Yum, Pil Joong Lee. 71-84 [doi]
- Pre-production Methods of a Response to Certificates with the Common Status - Design and Theoretical EvaluationSatoshi Koga, Jae-Cheol Ryou, Kouichi Sakurai. 85-97 [doi]
- Filling the Gap between Requirements Engineering and Public Key/Trust Management InfrastructuresPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone. 98-111 [doi]
- A Framework for Evaluating the Usability and the Utility of PKI-enabled ApplicationsTobias Straub, Harald Baier. 112-125 [doi]
- Using LDAP Directories for Management of PKI ProcessesVangelis Karatsiolis, Marcus Lippert, Alexander Wiesmaier. 126-134 [doi]
- Recursive Certificate Structures for X.509 SystemsSelwyn Russell. 135-148 [doi]
- A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial TransactionsAgapios N. Platis, Costas Lambrinoudakis, Assimakis K. Leros. 149-159 [doi]
- A Practical Approach of X.509 Attribute Certificate Framework as Support to Obtain Privilege DelegationJosé A. Montenegro, Fernando Moya. 160-172 [doi]
- TACAR: a Simple and Fast Way for Building Trust among PKIsDiego R. López, Chelo Malagon, Licia Florio. 173-179 [doi]
- On the Synergy Between Certificate Verification Trees and PayTree-like MicropaymentsJosep Domingo-Ferrer. 180-190 [doi]
- A Socially Inspired Reputation ModelNicola Mezzetti. 191-204 [doi]
- Using EMV Cards for Single Sign-OnAndreas Pashalidis, Chris J. Mitchell. 205-217 [doi]
- Distributing Security-Mediated PKIGabriel Vanrenen, Sean W. Smith. 218-231 [doi]
- Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve CryptographyCharikleia Zouridaki, Brian L. Mark, Kris Gaj, Roshan K. Thomas. 232-245 [doi]
- ÆTHER: an Authorization Management Architecture for Ubiquitous ComputingPatroklos G. Argyroudis, Donal O Mahony. 246-259 [doi]
- Trustworthy Accounting for Wireless LAN Sharing CommunitiesElias C. Efstathiou, George C. Polyzos. 260-273 [doi]
- Mobile Qualified Electronic Signatures and Certification on DemandHeiko Rossnagel. 274-286 [doi]
- Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi NetworksGeorgios Kambourakis, Angelos N. Rouskas, Dimitris Gritzalis. 287-296 [doi]
- A Credential Conversion Service for SAML-based ScenariosÓscar Cánovas Reverte, Gabriel López, Antonio F. Gómez-Skarmeta. 297-305 [doi]
- A New Design of Privilege Management Infrastructure with Binding Signature SemanticsKemal Bicakci, Nazife Baykal. 306-313 [doi]
- How to Qualify Electronic Signatures and Time StampsDetlef Hühnlein. 314-321 [doi]
- An Efficient Revocation Scheme for Stateless ReceiversYong Ho Hwang, Chong Hee Kim, Pil Joong Lee. 322-334 [doi]
- On the Use of Weber Polynomials in Elliptic Curve CryptographyElisavet Konstantinou, Yannis C. Stamatiou, Christos D. Zaroliagis. 335-349 [doi]
- Threshold Password-Based Authentication Using Bilinear PairingsSongwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Kim, So Ran Ine. 350-363 [doi]
- An Efficient Group Key Management Scheme for Secure Multicast with Multimedia ApplicationsChang N. Zhang, Zheng Li. 364-378 [doi]