Public Key Infrastructure

Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers

  • David Chadwick
  • Gansen Zhao
Conference proceedings EuroPKI 2005

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3545)

Table of contents

  1. Front Matter
  2. Authorisation

    1. Tobias Straub, Thilo-Alexander Ginkel, Johannes Buchmann
      Pages 1-21
    2. Richard W. C. Lui, Lucas C. K. Hui, S. M. Yiu
      Pages 22-35
  3. Interoperability

    1. Gabriel López, Óscar Cánovas, Antonio F. Gómez-Skarmeta, Sassa Otenko, David W. Chadwick
      Pages 55-72
    2. Guillermo Álvaro, Stephen Farrell, Tommy Lindberg, Roland Lockhart, Yunhao Zhang
      Pages 86-99
  4. Evaluating a CA

    1. Valentina Casola, Antonino Mazzeo, Nicola Mazzocca, Massimiliano Rak
      Pages 100-117
    2. John Marchesini, Sean Smith
      Pages 118-134
    3. Javier Lopez, Rolf Oppliger, Günther Pernul
      Pages 135-143
  5. ID Based Ring Signatures

    1. Sherman S. M. Chow, Richard W. C. Lui, Lucas C. K. Hui, S. M. Yiu
      Pages 144-161
  6. Practical Implementations

    1. Wensheng Xu, David W. Chadwick, Sassa Otenko
      Pages 162-179
    2. Mark Franklin, Kevin Mitcham, Sean Smith, Joshua Stabiner, Omen Wild
      Pages 180-190
  7. New Protocols

    1. SeongHan Shin, Kazukuni Kobara, Hideki Imai
      Pages 191-205
    2. Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong
      Pages 206-214
  8. Risks and Attacks

    1. Younggyo Lee, Injung Kim, Seungjoo Kim, Dongho Won
      Pages 215-226
    2. Adil Alsaid, Chris J. Mitchell
      Pages 227-239
  9. Long Term Archiving

  10. Back Matter

About these proceedings


This book contains the proceedings of the 2nd EuroPKI Workshop — EuroPKI 2005, held at the University of Kent in the city of Canterbury, UK, 30 June–1 July 2005. The workshop was informal and lively, and the university setting encouragedactive exchangesbetween the speakersand the audience. TheworkshopprogramcomprisedakeynotespeechfromDr.CarlisleAdams, followedby18refereedpapers,withaworkshopdinnerinandguidedtouraround the historic Dover Castle. Dr. Adams is well known for his contributions to the CAST family of s- metric encryption algorithms, to international standards from the IETF, ISO, and OASIS, authorship of over 30 refereed journals and conference papers, and co-authorship of Understanding PKI: Concepts, Standards, and Deployment Considerations (Addison-Wesley). Dr. Adams keynote speech was entitled ‘PKI: Views from the Dispassionate “I”,’ in which he presented his thoughts on why PKIhas been availableas an authentication technology for many years now,but has only enjoyed large-scale success in fairly limited contexts to date. He also presented his thoughts on the possible future(s) of this technology, with emp- sis on the major factors hindering adoption and some potential directions for future research in these areas. In response to the Call for Papers, 43 workshop papers were submitted in total. All papers were blind reviewed by at least two members of the Program Committee, the majority having 3 reviewers, with a few borderline papers h- ing 4 or more reviewers; 18 papers were accepted for presentation in 8 sessions.


Public Key RSA Signatur authentication authorization certification complexity digital signatures e-commerce identity modeling pki public key cryptography public key infrastructure security

Editors and affiliations

  • David Chadwick
    • 1
  • Gansen Zhao
    • 2
  1. 1.Computing LaboratoryUniversity of KentUK
  2. 2.The Computing LaboratoryUniversity of KentCanterburyUK

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-540-28062-0
  • Online ISBN 978-3-540-31585-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site