Conferences in DBLP
Jon Ølnes , Leif Buene Use of a Validation Authority to Provide Risk Management for the PKI Relying Party. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:1-15 [Conf ] Meiyuan Zhao , Sean W. Smith Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKI. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:16-30 [Conf ] Jong-Phil Yang , Kouichi Sakurai , Kyung Hyune Rhee Distributing Security-Mediated PKI Revisited. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:31-44 [Conf ] Eun-Jun Yoon , Kee-Young Yoo An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:45-53 [Conf ] Seung Wook Jung , Souhwan Jung Forward Secure Password-Enabled PKI with Instant Revocation. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:54-67 [Conf ] Willy Susilo , Yi Mu Separable Identity-Based Deniable Authentication: Cryptographic Primitive for Fighting Phishing. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:68-80 [Conf ] David Galindo , Paz Morillo , Carla Ràfols Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:81-91 [Conf ] Yongtae Kim , Chang Han Kim , Taek-Young Youn On the Security of Multilevel Cryptosystems over Class Semigroups of Imaginary Quadratic Non-maximal Orders. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:92-100 [Conf ] Man Ho Au , Sherman S. M. Chow , Willy Susilo , Patrick P. Tsang Short Linkable Ring Signatures Revisited. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:101-115 [Conf ] Stephen T. Kent An Infrastructure Supporting Secure Internet Routing. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:116-129 [Conf ] Massimiliano Pala , Antonio Lioy Fighting E-Mail Abuses: The EMPE Approach. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:130-144 [Conf ] Stephen Farrell DomainKeys Identified Mail Demonstrates Good Reasons to Re-invent the Wheel. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:145-153 [Conf ] Sebastian Fritsch , Vangelis Karatsiolis , Marcus Lippert , Alexander Wiesmaier , Johannes Buchmann Towards Secure Electronic Workflows. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:154-168 [Conf ] Manuel Sánchez , Gabriel López , Óscar Cánovas Reverte , Juan A. Sánchez , Antonio F. Gómez-Skarmeta An Access Control System for Multimedia Content Distribution. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:169-183 [Conf ] Jin Wook Byun , Dong Hoon Lee , Jongin Lim Efficient Conjunctive Keyword Search on Encrypted Data Storage System. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:184-196 [Conf ] Eun-Jun Yoon , Kee-Young Yoo Enhanced Forward-Secure User Authentication Scheme with Smart Cards. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:197-206 [Conf ] Ke Zeng Pseudonymous PKI for Ubiquitous Computing. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:207-222 [Conf ] Sungduk Kim , Kyungjin Kim , Jaedong Jung , Dongho Won An Efficient POP Protocol Based on the Signcryption Scheme for the WAP PKI. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:223-232 [Conf ] Maurizio Adriano Strangio On the Resilience of Key Agreement Protocols to Key Compromise Impersonation. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:233-247 [Conf ] YoungGyo Lee , Jeonghee Ahn , Seungjoo Kim , Dongho Won A PKI System for Detecting the Exposure of a User's Secret Key. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:248-250 [Conf ] Lenka Kadlcáková A Guide to the Nightmares of the Certification Service Provider. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:251-253 [Conf ] Chung-Ming Ou , C. R. Ou A High-Level 3G Wireless PKI Solution for Secure Healthcare Communications. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:254-256 [Conf ] Sherman S. M. Chow Identity-Based Strong Multi-Designated Verifiers Signatures. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2006, pp:257-259 [Conf ]