Abstract is missing.
- A Brief Introduction to Certificateless Encryption Schemes and Their InfrastructuresAlexander W. Dent. 1-16 [doi]
- A Computational Framework for Certificate Policy OperationsGabriel A. Weaver, Scott A. Rea, Sean W. Smith. 17-33 [doi]
- Resource Management with X.509 Inter-domain Authorization Certificates (InterAC)Vishwas Patil, Paolo Gasti, Luigi V. Mancini, Giovanni Chiola. 34-50 [doi]
- Reducing the Cost of Certificate Revocation: A Case StudyMona Holsve Ofigsbø, Stig Fr. Mjølsnes, Poul E. Heegaard, Leif Nilsen. 51-66 [doi]
- Automatic Generation of Sigma-ProtocolsEndre Bangerter, Thomas Briner, Wilko Henecka, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider 0003. 67-82 [doi]
- A Secure and Efficient Authenticated Diffie-Hellman ProtocolAugustin P. Sarr, Philippe Elbaz-Vincent, Jean-Claude Bajard. 83-98 [doi]
- Key Management for Large-Scale Distributed Storage SystemsHoon Wei Lim. 99-113 [doi]
- Nationwide PKI Testing - Ensuring Interoperability of OCSP Server and Client Implementations Early during Component TestsChristian Schanes, Andreas Mauczka, Uwe Kirchengast, Thomas Grechenig, Sven Marx. 114-129 [doi]
- On Device Identity Establishment and VerificationRoberto Gallo, Henrique Kawakami, Ricardo Dahab. 130-145 [doi]
- ABUSE: PKI for Real-World Email TrustChris Masone, Sean W. Smith. 146-162 [doi]
- Public-Key Encryption with Registered Keyword SearchQiang Tang, Liqun Chen. 163-178 [doi]
- Practicalization of a Range Test and Its Application to E-AuctionKun Peng, Feng Bao. 179-194 [doi]
- Timed-Ephemerizer: Make Assured Data Appear and DisappearQiang Tang. 195-208 [doi]
- Privacy and Liveliness for Reputation SystemsStefan Schiffner, Sebastian Clauß, Sandra Steinbrecher. 209-224 [doi]
- A Multidimensional Reputation Scheme for Identity FederationsIsaac Agudo, M. Carmen Fernández Gago, Javier Lopez. 225-238 [doi]
- On the Usability of User Interfaces for Secure Website Authentication in BrowsersMassimiliano Pala, Yifei Wang. 239-254 [doi]
- Validity Models of Electronic Signatures and Their Enforcement in PracticeHarald Baier, Vangelis Karatsiolis. 255-270 [doi]
- Biometric Identity Based Signature RevisitedNeyire Deniz Sarier. 271-285 [doi]
- How to Construct Identity-Based Signatures without the Key Escrow ProblemTsz Hon Yuen, Willy Susilo, Yi Mu. 286-301 [doi]