Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/europki/europki2010.bht:"
@proceedings{DBLP:conf/europki/2010, editor = {Jan Camenisch and Costas Lambrinoudakis}, title = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6711}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22633-5}, doi = {10.1007/978-3-642-22633-5}, isbn = {978-3-642-22632-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/Accorsi10, author = {Rafael Accorsi}, editor = {Jan Camenisch and Costas Lambrinoudakis}, title = {BBox: {A} Distributed Secure Log Architecture}, booktitle = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6711}, pages = {109--124}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22633-5\_8}, doi = {10.1007/978-3-642-22633-5\_8}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/europki/Accorsi10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/DemertzisX10, author = {Foivos F. Demertzis and Christos Xenakis}, editor = {Jan Camenisch and Costas Lambrinoudakis}, title = {{SOMA:} Self-Organised Mesh Authentication}, booktitle = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6711}, pages = {31--44}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22633-5\_3}, doi = {10.1007/978-3-642-22633-5\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/DemertzisX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/DrogkarisG10, author = {Prokopios Drogkaris and Stefanos Gritzalis}, editor = {Jan Camenisch and Costas Lambrinoudakis}, title = {Attaching Multiple Personal Identifiers in {X.509} Digital Certificates}, booktitle = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6711}, pages = {171--177}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22633-5\_12}, doi = {10.1007/978-3-642-22633-5\_12}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/DrogkarisG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/EmuraMO10, author = {Keita Emura and Atsuko Miyaji and Kazumasa Omote}, editor = {Jan Camenisch and Costas Lambrinoudakis}, title = {An Identity-Based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-List System}, booktitle = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6711}, pages = {77--92}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22633-5\_6}, doi = {10.1007/978-3-642-22633-5\_6}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/EmuraMO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/GrayS10, author = {David Gray and Caroline Sheedy}, editor = {Jan Camenisch and Costas Lambrinoudakis}, title = {E-Voting: {A} New Approach Using Double-Blind Identity-Based Encryption}, booktitle = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6711}, pages = {93--108}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22633-5\_7}, doi = {10.1007/978-3-642-22633-5\_7}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/GrayS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/HeidarvandV10, author = {Somayeh Heidarvand and Jorge L. Villar}, editor = {Jan Camenisch and Costas Lambrinoudakis}, title = {A Fair and Abuse-Free Contract Signing Protocol from Boneh-Boyen Signature}, booktitle = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6711}, pages = {125--140}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22633-5\_9}, doi = {10.1007/978-3-642-22633-5\_9}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/HeidarvandV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/KerschbaumS10, author = {Florian Kerschbaum and Alessandro Sorniotti}, editor = {Jan Camenisch and Costas Lambrinoudakis}, title = {Searchable Encryption for Outsourced Data Analytics}, booktitle = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6711}, pages = {61--76}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22633-5\_5}, doi = {10.1007/978-3-642-22633-5\_5}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/KerschbaumS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/KimBKZ10, author = {Jangseong Kim and Joonsang Baek and Kwangjo Kim and Jianying Zhou}, editor = {Jan Camenisch and Costas Lambrinoudakis}, title = {A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments}, booktitle = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6711}, pages = {45--60}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22633-5\_4}, doi = {10.1007/978-3-642-22633-5\_4}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/KimBKZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/KumarABR10, author = {Swarun Kumar and Shivank Agrawal and Subha Balaraman and C. Pandu Rangan}, editor = {Jan Camenisch and Costas Lambrinoudakis}, title = {Attribute Based Signatures for Bounded Multi-level Threshold Circuits}, booktitle = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6711}, pages = {141--154}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22633-5\_10}, doi = {10.1007/978-3-642-22633-5\_10}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/europki/KumarABR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/MBarkaS10, author = {Moez Ben MBarka and Julien P. Stern}, editor = {Jan Camenisch and Costas Lambrinoudakis}, title = {Observations on Certification Authority Key Compromise}, booktitle = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6711}, pages = {178--192}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22633-5\_13}, doi = {10.1007/978-3-642-22633-5\_13}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/MBarkaS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/PalaSS10, author = {Massimiliano Pala and Sara Sinclair and Sean W. Smith}, editor = {Jan Camenisch and Costas Lambrinoudakis}, title = {PorKI: Portable {PKI} Credentials via Proxy Certificates}, booktitle = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6711}, pages = {1--16}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22633-5\_1}, doi = {10.1007/978-3-642-22633-5\_1}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/PalaSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/RamosSLKC10, author = {Thiago Ac{\'{o}}rdi Ramos and Nelson da Silva and Lau Cheuk Lung and Jonathan Gehard Kohler and Ricardo Felipe Cust{\'{o}}dio}, editor = {Jan Camenisch and Costas Lambrinoudakis}, title = {An Infrastructure for Long-Term Archiving of Authenticated and Sensitive Electronic Documents}, booktitle = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6711}, pages = {193--207}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22633-5\_14}, doi = {10.1007/978-3-642-22633-5\_14}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/RamosSLKC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/VossaertLDN10, author = {Jan Vossaert and Jorn Lapon and Bart De Decker and Vincent Naessens}, editor = {Jan Camenisch and Costas Lambrinoudakis}, title = {User-Centric Identity Management Using Trusted Modules}, booktitle = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6711}, pages = {155--170}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22633-5\_11}, doi = {10.1007/978-3-642-22633-5\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/VossaertLDN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/WenZ10, author = {Yamin Wen and Fangguo Zhang}, editor = {Jan Camenisch and Costas Lambrinoudakis}, title = {A New Revocable Secret Handshake Scheme with Backward Unlinkability}, booktitle = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6711}, pages = {17--30}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22633-5\_2}, doi = {10.1007/978-3-642-22633-5\_2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/europki/WenZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.