Abstract is missing.
- Use of a Validation Authority to Provide Risk Management for the PKI Relying PartyJon Ølnes, Leif Buene. 1-15 [doi]
- Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKIMeiyuan Zhao, Sean W. Smith. 16-30 [doi]
- Distributing Security-Mediated PKI RevisitedJong-Phil Yang, Kouichi Sakurai, Kyung Hyune Rhee. 31-44 [doi]
- An Improved Lu-Cao s Remote User Authentication Scheme Using Smart CardEun-Jun Yoon, Kee-Young Yoo. 45-53 [doi]
- Forward Secure Password-Enabled PKI with Instant RevocationSeung Wook Jung, Souhwan Jung. 54-67 [doi]
- Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting PhishingWilly Susilo, Yi Mu. 68-80 [doi]
- Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption SchemesDavid Galindo, Paz Morillo, Carla Ràfols. 81-91 [doi]
- On the Security of Multilevel Cryptosystems over Class Semigroups of Imaginary Quadratic Non-maximal OrdersYongtae Kim, Chang-Han Kim, Taek-Young Youn. 92-100 [doi]
- Short Linkable Ring Signatures RevisitedMan Ho Au, Sherman S. M. Chow, Willy Susilo, Patrick P. Tsang. 101-115 [doi]
- An Infrastructure Supporting Secure Internet RoutingStephen T. Kent. 116-129 [doi]
- Fighting E-Mail Abuses: The EMPE ApproachMassimiliano Pala, Antonio Lioy. 130-144 [doi]
- DomainKeys Identified Mail Demonstrates Good Reasons to Re-invent the WheelStephen Farrell. 145-153 [doi]
- Towards Secure Electronic WorkflowsSebastian Fritsch, Vangelis Karatsiolis, Marcus Lippert, Alexander Wiesmaier, Johannes Buchmann. 154-168 [doi]
- An Access Control System for Multimedia Content DistributionManuel Sánchez, Gabriel López, Óscar Cánovas Reverte, Juan A. Sánchez, Antonio F. Gómez-Skarmeta. 169-183 [doi]
- Efficient Conjunctive Keyword Search on Encrypted Data Storage SystemJin Wook Byun, Dong-Hoon Lee, Jongin Lim. 184-196 [doi]
- Enhanced Forward-Secure User Authentication Scheme with Smart CardsEun-Jun Yoon, Kee-Young Yoo. 197-206 [doi]
- Pseudonymous PKI for Ubiquitous ComputingKe Zeng. 207-222 [doi]
- An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKISungduk Kim, Kyungjin Kim, Jaedong Jung, Dongho Won. 223-232 [doi]
- On the Resilience of Key Agreement Protocols to Key Compromise ImpersonationMaurizio Adriano Strangio. 233-247 [doi]
- A PKI System for Detecting the Exposure of a User s Secret KeyYoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won. 248-250 [doi]
- A Guide to the Nightmares of the Certification Service ProviderLenka Kadlcáková. 251-253 [doi]
- A High-Level 3G Wireless PKI Solution for Secure Healthcare CommunicationsChung-Ming Ou, Chung-Ren Ou. 254-256 [doi]
- Identity-Based Strong Multi-Designated Verifiers SignaturesSherman S. M. Chow. 257-259 [doi]