Public Key Infrastructure : Proceedings of EuroPKI2005

UNSPECIFIED (2005) Public Key Infrastructure : Proceedings of EuroPKI2005. In: Chadwick, David W. and Zhao, Gansen, eds. Public Key Infrastructure. Lecture Notes in Computer Science, 3545. Springer ISBN 978-3-540-28062-0. (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided. (Contact us about this Publication)


This book contains the proceedings of the 2nd EuroPKI Workshop EuroPKI 2005, held at the University of Kent in the city of Canterbury, UK, 30 June1 July 2005. The workshop was informal and lively, and the university setting encouraged active exchanges between the speakers and the audience. The workshop program comprised a keynote speech from Dr. Carlisle Adams, followed by 18 refereed papers, with a workshop dinner in and guided tour around the historic Dover Castle. Dr. Adams is well known for his contributions to the CAST family of symmetric encryption algorithms, to international standards from the IETF, ISO, and OASIS, authorship of over 30 refereed journals and conference papers, and co-authorship of Understanding PKI: Concepts, Standards, and Deployment Considerations (Addison-Wesley). Dr. Adams keynote speech was entitled PKI: Views from the Dispassionate I, in which he presented his thoughts on why PKI has been available as an authentication technology for many years now, but has only enjoyed large-scale success in fairly limited contexts to date. He also presented his thoughts on the possible future(s) of this technology, with emphasis on the major factors hindering adoption and some potential directions for future research in these areas. In response to the Call for Papers, 43 workshop papers were submitted in total. All papers were blind reviewed by at least two members of the Program Committee, the majority having 3 reviewers, with a few borderline papers having 4 or more reviewers; 18 papers were accepted for presentation in 8 sessions. There were sessions on: authorization, risks/attacks to PKI systems, interoperability between systems, evaluating a CA, ID ring-based signatures, new protocols, practical implementations, and long-term archiving. I would like to thank the authors for their submitted papers, the Program Committee and external reviewers for their conscientious efforts during the review process, the Organizing Committee for their tireless efforts to ensure the smooth running of the conference, and finally all the workshop participants,

Item Type: Conference or workshop item (Lecture)
Additional information: available online at
Uncontrolled keywords: PKI, CA, Digital Signature, Security, Authorization
Subjects: Q Science > QA Mathematics (inc Computing science) > QA 76 Software, computer programming,
Divisions: Faculties > Sciences > School of Computing > Security Group
Depositing User: Mark Wheadon
Date Deposited: 24 Nov 2008 18:02 UTC
Last Modified: 02 Jul 2009 19:46 UTC
Resource URI: (The current URI for this page, for reference purposes)
  • Depositors only (login required):