Review Form for #104790: Cleaning up the PKI for Long-term Signatures

Make sure that your comments, when of a negative character, can be used in a constructive manner. Remember that the main goal of this conference is the advancement and strengthening of the research community in the area of Computer Security. This requires fair judgement and openness to the debate of ideas.
Manuscript:
Paper manuscriptPDF 0.3 MB
Printing problems:Printing Problems?

As a TPC member, you can delegate this review to another TPC member. Warning: if you delegate it, you will no longer be able to access this paper.

You can assign this paper to another reviewer that is not a TPC member. In this case, you will be able the check the assigned review.

Originality: Does the paper presents an original contribution?1: No relevant contribution
2: Doubtful contribution
3: Original contribution with minor impact
4: Significant original contribution
Relevance of this paper to research in Security.: Please, evaluate the relevance of this paper to its specific Security subarea of research. Consider aspects such as the proposed topic, the review of the state of the art and the relevance of the results themselves.1: Insuficient, wrong or incoherent results.
2: Results are unclear or of questionable value.
3: Results are coherent and of moderate relevance
4: Very relevant and unquestionable results
Technical quality: Please, evaluate the paper's quality with respect to its technical soundness, ie, the applied methodology, mathematical formalism and depth, and the quality of results.1: Poor
2: Weak
3: Good
4: Excellent
Paper's presentation: Please, evaluate the paper's legibility, neatness, general organization and development of ideas, presentation of results, use/adequacy of diagrams, etc.1: Inadequate for publication
2: Readable but needs major editorial revision
3: Acceptable but needs some minor revision
4: Clear, with good structure and well presented.
Suitability to the call for papers: Please evaluate the adequacy and suitability of the proposed topic of research to those listed in the call for papers or to the conference in general.1: Far off the conference's interests
2: Of little interest to the conference
3: Topic is relevant and of interest to the conference's targeted audience
4: Hot topic
Familiarity of the reviewer: Please, consider your familiarity with the paper's area of research.1: Superficial knowledge of the topic
2: Knowledgeable in the area
3: Expert
Final grade and recommendation: Based on your previous grades and your general impression, please make a final recommendation regarding this paper's acceptance to the conference.1: Reject
2: Weak reject
3: Weak accept
4: Accept
Summary of the article: Please give a summary of the main contributions and results of this article.
Strong points about this work: Please, present the main strengths of this paper. In case of a (weak) accept recommendation, please elaborate on the reasons.
Main weaknesses of the article: Please, present the main weaknesses and/or flaws present in the paper. In case of a (weak) reject recommendation, please elaborate on the reasons.
Comments to the authors: Please, provide your comments and recommendations to the authors. Following your recommendation, give advice and suggestions for improvements.
Comments to the Program Committee: Please, insert here comments restricted to the Program Committee, which may help in reaching a final decision regarding acceptance of this paper.

All conferences
JEMS portal
log out
Logout
A service of
Brazilian Computing Society
 Maintained by
Federal University of Rio Grande do Sul