Sciweavers

EUROPKI
2004
Springer
14 years 5 months ago
A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications
Abstract. Besides the pure technical features, the usability of a PKIenabled application plays a crucial role since the best security application will fail in practice if its usabi...
Tobias Straub, Harald Baier
EUROPKI
2004
Springer
14 years 5 months ago
Mobile Qualified Electronic Signatures and Certification on Demand
Despite a legal framework being in place for several years, the market share of qualified electronic signatures is disappointingly low. Mobile Signatures provide a new and promisin...
Heiko Rossnagel
EUROPKI
2004
Springer
14 years 5 months ago
A Probabilistic Model for Evaluating the Operational Cost of PKI-based Financial Transactions
The use of PKI in large scale environments suffers some inherent problems concerning the options to adopt for the optimal cost-centered operation of the system. In this paper a Mar...
Agapios N. Platis, Costas Lambrinoudakis, Assimaki...
EUROPKI
2004
Springer
14 years 5 months ago
Using EMV Cards for Single Sign-On
Abstract. At present, network users have to manage a set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single S...
Andreas Pashalidis, Chris J. Mitchell
EUROPKI
2004
Springer
14 years 5 months ago
The EuroPKI Experience
Abstract. This paper discusses the technical and management experience gained in the day-by-day operation of the EuroPKI infrastructure. First the context where EuroPKI was born is...
Antonio Lioy, Marius Marian, Natalia Moltchanova, ...
EUROPKI
2004
Springer
14 years 5 months ago
Threshold Password-Based Authentication Using Bilinear Pairings
We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private k...
Songwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Ki...
EUROPKI
2004
Springer
14 years 5 months ago
On the Use of Weber Polynomials in Elliptic Curve Cryptography
Abstract. In many cryptographic applications it is necessary to generate elliptic curves (ECs) with certain security properties. These curves are commonly constructed using the Com...
Elisavet Konstantinou, Yannis C. Stamatiou, Christ...
EUROPKI
2004
Springer
14 years 5 months ago
Using LDAP Directories for Management of PKI Processes
We present a framework for extending the functionality of LDAP servers from their typical use as a public directory in public key infrastructures. In this framework the LDAP server...
Vangelis Karatsiolis, Marcus Lippert, Alexander Wi...
EUROPKI
2004
Springer
14 years 5 months ago
Distributing Security-Mediated PKI
The security-mediated approach to PKI offers several advantages, such as instant revocation and compatibility with standard RSA tools. In this paper, we present a design and protot...
Gabriel Vanrenen, Sean W. Smith
EUROPKI
2004
Springer
14 years 5 months ago
Flexible and Scalable Public Key Security for SSH
Abstract. A standard tool for secure remote access, the SSH protocol uses publickey cryptography to establish an encrypted and integrity-protected channel with a remote server. How...
Yasir Ali, Sean W. Smith