© 2008

Public Key Infrastructure

5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedings

  • Editors
  • Stig F. Mjølsnes
  • Sjouke Mauw
  • Sokratis K. Katsikas
Conference proceedings EuroPKI 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5057)

Table of contents

  1. Front Matter
  2. Invited Talk

  3. Certificates

    1. David Montana, Mark Reynolds
      Pages 17-30
    2. Jon A. Solworth
      Pages 31-48
    3. Ricardo Felipe Custódio, Martín A. Gagliotti Vigil, Juliano Romani, Fernando Carlos Pereira, Joni da Silva Fraga
      Pages 49-59
  4. Authentication

    1. Ralph Holz, Heiko Niedermayer, Peter Hauck, Georg Carle
      Pages 74-88
    2. Manuel Sánchez, Óscar Cánovas, Gabriel López, Antonio F. Gómez-Skarmeta
      Pages 89-103
  5. Practice

    1. Yasuo Miyakawa, Takashi Kurokawa, Akihiro Yamamura, Yasushi Matsumoto
      Pages 104-117
    2. Bart De Decker, Mohamed Layouni, Hans Vangheluwe, Kristof Verslype
      Pages 118-133
  6. Signatures

    1. Billy Bob Brumley, Kimmo U. Järvinen
      Pages 134-149
    2. Go Ohtake, Goichiro Hanaoka, Kazuto Ogawa
      Pages 150-165
    3. Basel Alomair, Krishna Sampigethaya, Radha Poovendran
      Pages 166-181
  7. Analysis

    1. Chong Hee Kim, Philippe Bulens, Christophe Petit, Jean-Jacques Quisquater
      Pages 182-195
  8. Networks

    1. Massimiliano Pala, Sean W. Smith
      Pages 223-238
  9. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 5th European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2008, held in Trondheim, Norway, in June 2008.

The 15 revised full papers presented together with 1 invited paper were carefully reviewed and selected from 37 submissions. Ranging from theoretical and foundational topics to applications and regulatory issues in various contexts, the papers focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and low cost means for assuring authenticity and validity of public keys used in large-scale networked services.


DOM Public Key algorithms anonymity anonymous credentials certification cryptography digital signatures distributed systems e-government electronic healthcare healthcare identity privacy trust

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking