Conferences In Information Security
Conference Name | Sixth European Workshop on Public Key Services, Applications and Infrastructures |
---|---|
Venue | Pisa, Italy |
URL | http://www.iit.cnr.it/EUROPKI09/ |
Submission Deadline | 1. June 2010 |
Conference Date | 9-11 September, 2010 |
Sponsership/Publisher | Springer |
Aim/Scope/Research Area |
Goals and Topics of Interest
The most significant changes that have resulted from the rapid technological evolution in Information and Communication Technologies (ICT) are related to the way private and public sector organizations transform their conventional operating models to internet-based service models (eBusiness, eCommerce and eGovernment). Specifically, companies, institutions and organizations, irrespective of their size, are utilizing the Internet for communicating with their customers, suppliers and partners, for facilitating the interconnection of their employees and branches, for connecting to their back-end data systems and for performing commercial transactions. In such an environment new dependencies and risks arise. Public Key Infrastructure (PKI) is probably one of the most important items in the arsenal of security measures that can be brought to bear against the aforementioned growing risks and threats. Furthermore, Public Key Cryptography (PKC) services and applications make steady inroads into the various information security solutions needed, providing genuine benefits in selected application areas. The 7th European Workshop on Public Key Services, Applications and Infrastructures (ΕuroPKI´10)will provide an international forum for researchers and practitioners to exchange information regarding advancements in the state of the art and the practical aspects of Public Key services, applications and infrastructures. To Dowload the Call please click here. EuroPKI’10 seeks papers, work-in-progress reports and presentation of applications – services – practical experiences on topics related, but not limited to: Anonymity: Key Management Applications of PKI & PKC: Key Agreement/Establishment Architecture and Modeling: Legal issues Authentication: Long-time archiving Authorization and Delegation: Mobile PKI Bridge CA: Multi-Party/Group Protocols Case Studies: Multi-signatures Certificates Status: Novel Public-key Cryptosystems Certification Policy and Practices: Optimization Credentials: PKC e-voting schemes Cross Certification: Policies & Regulations Cryptanalysis and protocol Weaknesses: Privacy Directories: Privilege Management Digital Signatures: Protocols Distributed Crypto-Computing: Reliability in PKI eCommerce / eGovernment: Repositories Evaluation: Risk & attacks Fault-Tolerance and reliability: Standards Federations: Threshold Cryptosystems Formal methods: Timestamping Group signatures: Trust management Identification: Trusted Computing Identity-Based schemes: Ubiquitous scenarios Identity Management and eID: Usage Control Implementations: Verification Interoperability: Web services security |