Abstract is missing.
- Authorization Architectures for Privacy-Respecting SurveillanceUlrich Flegel, Michael Meier. 1-17 [doi]
- Privacy-Preserving Revocation Checking with Modified CRLsMaithili Narasimha, Gene Tsudik. 18-33 [doi]
- E-Passports as a Means Towards the First World-Wide Public Key InfrastructureDimitrios Lekkas, Dimitris Gritzalis. 34-48 [doi]
- An Interdomain PKI Model Based on Trust ListsHelena Rifà-Pous, Jordi Herrera-Joancomartí. 49-64 [doi]
- One-More Extension of Paillier Inversion Problem and Concurrent Secure IdentificationYan Song. 65-77 [doi]
- An Efficient Signcryption Scheme with Key PrivacyChung Ki Li, Guomin Yang, Duncan S. Wong, Xiaotie Deng, Sherman S. M. Chow. 78-93 [doi]
- Direct Chosen-Ciphertext Secure Hierarchical ID-Based Encryption SchemesJong Hwan Park, Dong-Hoon Lee. 94-109 [doi]
- Certificate-Based Signature: Security Model and Efficient ConstructionJiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, Qianhong Wu. 110-125 [doi]
- Time Capsule Signature: Efficient and Provably Secure ConstructionsBessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin Yang, Xiaotie Deng. 126-142 [doi]
- A New Variant for an Attack Against RSA Signature Verification Using Parameter FieldYutaka Oiwa, Kazukuni Kobara, Hajime Watanabe. 143-153 [doi]
- AutoPKI: A PKI Resources Discovery SystemMassimiliano Pala, Sean W. Smith. 154-169 [doi]
- Bootstrapping a Global SSO from Network Access Control MechanismsManuel Sánchez, Gabriel López Millán, Óscar Cánovas Reverte, Antonio F. Gómez-Skarmeta. 170-180 [doi]
- Anonymous ::::k:::: -Show CredentialsMohamed Layouni, Hans Vangheluwe. 181-192 [doi]
- On Partial Anonymity in Secret SharingVanesa Daza, Josep Domingo-Ferrer. 193-202 [doi]
- Anonymous Identification and Designated-Verifiers Signatures from Insecure Batch VerificationSherman S. M. Chow, Duncan S. Wong. 203-219 [doi]
- OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure s Hardware Security ModulesJean Everson Martina, Túlio Cicero Salvaro de Souza, Ricardo Felipe Custódio. 220-235 [doi]
- Two Worlds, One Smart Card: An Integrated Solution for Physical Access and Logical Security Using PKI on a Single Smart CardJaap-Henk Hoepman, Geert Kleinhuis. 236-247 [doi]
- On the Robustness of Applications Based on the SSL and TLS Security ProtocolsDiana Berbecaru, Antonio Lioy. 248-264 [doi]
- Using WebDAV for Improved Certificate Revocation and PublicationDavid W. Chadwick, Sean Anthony. 265-279 [doi]
- Reducing the Computational Cost of Certification Path Validation in Mobile PaymentCristina Satizábal, Rafael Martínez-Peláez, Jordi Forné, Francisco Rico-Novella. 280-296 [doi]
- Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile CodeNicola Dragoni, Fabio Massacci, Katsiaryna Naliuka, Ida Siahaan. 297-312 [doi]
- Applicability of Public Key Infrastructures in Wireless Sensor NetworksRodrigo Roman, Cristina Alcaraz. 313-320 [doi]
- Spatial-Temporal Certification Framework and Extension of X.509 Attribute Certificate Framework and SAML Standard to Support Spatial-Temporal CertificatesAna Isabel González-Tablas Ferreres, Benjamín Ramos Álvarez, Arturo Ribagorda Garnacho. 321-329 [doi]
- Electronic Payment Scheme Using Identity-Based CryptographySon Thanh Nguyen, Chunming Rong. 330-337 [doi]
- Undeniable Mobile Billing SchemesShiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen. 338-345 [doi]
- Universally Composable SigncryptionKristian Gjøsteen, Lillian Kråkmo. 346-353 [doi]
- Chord-PKI: Embedding a Public Key Infrastructure into the Chord Overlay NetworkAgapios Avramidis, Panayiotis Kotzanikolaou, Christos Douligeris. 354-361 [doi]
- Privacy Protection in Location-Based Services Through a Public-Key Privacy HomomorphismAgusti Solanas, Antoni Martínez-Ballesté. 362-368 [doi]
- A Critical View on RFC 3647Klaus Schmeh. 369-374 [doi]