Sciweavers

EUROPKI
2006
Springer
13 years 8 months ago
Pseudonymous PKI for Ubiquitous Computing
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applicat...
Ke Zeng
EUROPKI
2006
Springer
13 years 8 months ago
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Abstract. Key agreement protocols are a fundamental building block for ensuring authenticated and private communications between two parties over an insecure network. This paper fo...
Maurizio Adriano Strangio
EUROPKI
2006
Springer
13 years 8 months ago
Towards Secure Electronic Workflows
Sebastian Fritsch, Vangelis Karatsiolis, Marcus Li...
EUROPKI
2006
Springer
13 years 8 months ago
Efficient Conjunctive Keyword Search on Encrypted Data Storage System
Jin Wook Byun, Dong Hoon Lee, Jongin Lim
EUROPKI
2006
Springer
13 years 8 months ago
Short Linkable Ring Signatures Revisited
Ring signature is a group-oriented signature in which the signer can spontaneously form a group and generate a signature such that the verifier is convinced the signature was gener...
Man Ho Au, Sherman S. M. Chow, Willy Susilo, Patri...