Conferences In Information Security

Conference Name Sixth European Workshop on Public Key Services, Applications and Infrastructures
Venue Pisa, Italy    
URL http://www.iit.cnr.it/EUROPKI09/
Submission Deadline 1. June 2010
Conference Date 9-11 September, 2010
Sponsership/Publisher Springer
Aim/Scope/Research Area Goals and Topics of Interest
The most significant changes that have resulted from the rapid technological evolution in Information and Communication Technologies (ICT) are related to the way private and public sector organizations transform their conventional operating models to internet-based service models (eBusiness, eCommerce and eGovernment). Specifically, companies, institutions and organizations, irrespective of their size, are utilizing the Internet for communicating with their customers, suppliers and partners, for facilitating the interconnection of their employees and branches, for connecting to their back-end data systems and for performing commercial transactions. In such an environment new dependencies and risks arise.

Public Key Infrastructure (PKI) is probably one of the most important items in the arsenal of security measures that can be brought to bear against the aforementioned growing risks and threats. Furthermore, Public Key Cryptography (PKC) services and applications make steady inroads into the various information security solutions needed, providing genuine benefits in selected application areas.

The 7th European Workshop on Public Key Services, Applications and Infrastructures (ΕuroPKI´10)will provide an international forum for researchers and practitioners to exchange information regarding advancements in the state of the art and the practical aspects of Public Key services, applications and infrastructures. To Dowload the Call please click here.

EuroPKI’10 seeks papers, work-in-progress reports and presentation of applications – services – practical experiences on topics related, but not limited to:
Anonymity: Key Management
Applications of PKI & PKC: Key Agreement/Establishment
Architecture and Modeling: Legal issues
Authentication: Long-time archiving
Authorization and Delegation: Mobile PKI
Bridge CA: Multi-Party/Group Protocols
Case Studies: Multi-signatures
Certificates Status: Novel Public-key Cryptosystems
Certification Policy and Practices: Optimization
Credentials: PKC e-voting schemes
Cross Certification: Policies & Regulations
Cryptanalysis and protocol Weaknesses: Privacy
Directories: Privilege Management
Digital Signatures: Protocols
Distributed Crypto-Computing: Reliability in PKI
eCommerce / eGovernment: Repositories
Evaluation: Risk & attacks
Fault-Tolerance and reliability: Standards
Federations: Threshold Cryptosystems
Formal methods: Timestamping
Group signatures: Trust management
Identification: Trusted Computing
Identity-Based schemes: Ubiquitous scenarios
Identity Management and eID: Usage Control
Implementations: Verification
Interoperability: Web services security

Back To Conferences List

Database Sections