Authentication Mechanisms.-Secret Handshake Scheme with Request-Based-Revealing .-Password-Based Signatures.-Isolating Partial Information of Indistinguishable Encryptions.-Invited Paper.-A Universal Client-Based Identity Management Tool .-Privacy Preserving Techniques Design and Evaluation of a Privacy-Preserving Architecture for Vehicle-to-Grid Interaction.-Insider Attacks and Privacy of RFID Protocols.-Cell-Based Roadpricing.-Invited Paper.-Ballot Aggregation and Mixnet Based Open-Audit Elections (Extended Abstract).-Invited Paper.-PKI as Part of an Integrated Risk Management Strategy for Web Security.-PKI Applications.-A PKI-Based Mobile Banking Demonstrator.-Certification Validation: Back to the Past.-Secure Applications. A Hijacker's Guide to the LPC Bus.-Secure Event Logging in Sensor Networks.-
This book constitutes the thoroughly refereed post-conference proceedings of the 8th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2011, held in Leuven, Belgium in September 2011 - co-located with the 16th European Symposium on Research in Computer Security, ESORICS 2011.
The 10 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 27 submissions. The papers are organized in topical sections on authentication mechanisms, privacy preserving techniques, PKI and secure applications.