Public Key Infrastructures (PKI) are a trust management technology for public keys, consisting of several interconnected Certifying Authorities (CAs). The CAs issue certificates that establish ownership of public keys, which can be used to support a…
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Information Theoretic Security, ICITS 2007, held in Madrid, Spain, in May 2007. The 13 revised full papers presented in this volume w…
This book constitutes the refereed proceedings of the 6th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2003, held in Miami, Florida, USA in January 2003.The 26 revised full papers presented were carefully reviewed a…
The CRYPTO '94 conference is sponsored by the International Association for Cryptologic Research (IACR), in co-operation with the IEEE Computer Society Technical Committee on Security and Privacy. It has taken place at the Univ- sity of California,…
The 4th International Conference on Cryptology and Network Security (CANS 2005) was held in Xiamen, Fujian Province, China, December 14-16, 2005. The conference was sponsored by the Fujian Normal University and Fujian Digital Certi?cate Authority Co…
This book constitutes the thoroughly refereedpost-conference proceedings of the 16th International Conference on InformationSecurity, ISC 2013, held in Dallas, Texas, in November 2013.The 16 revised full papers presented together with 14short papers…