Goals and Topics of Interest

The most significant changes that have resulted from the rapid technological evolution in Information and Communication Technologies (ICT) are related to the way private and public sector organizations transform their conventional operating models to internet-based service models (eBusiness, eCommerce and eGovernment). Specifically, companies, institutions and organizations, irrespective of their size, are utilizing the Internet for communicating with their customers, suppliers and partners, for facilitating the interconnection of their employees and branches, for connecting to their back-end data systems and for performing commercial transactions. In such an environment new dependencies and risks arise.

Public Key Infrastructure (PKI) is probably one of the most important items in the arsenal of security measures that can be brought to bear against the aforementioned growing risks and threats. Furthermore, Public Key Cryptography (PKC) services and applications make steady inroads into the various information security solutions needed, providing genuine benefits in selected application areas.

The 7th European Workshop on Public Key Services, Applications and Infrastructures (ΕuroPKI´10)will provide an international forum for researchers and practitioners to exchange information regarding advancements in the state of the art and the practical aspects of Public Key services, applications and infrastructures. To Dowload the Call please click here.

A Special Issue of EuroPKI’2010 with extended versions of the best workshop papers will be published in the Mathematical and Computer Modelling journal by Elsevier. http://www.elsevier.com/wps/locate/mcm.

EuroPKI’10 seeks papers, work-in-progress reports and presentation of applications – services – practical experiences on topics related, but not limited to:

  • Anonymity
  • Key Management
  • Applications of PKI & PKC
  • Key Agreement/Establishment
  • Architecture and Modeling
  • Legal issues
  • Authentication
  • Long-time archiving
  • Authorization and Delegation
  • Mobile PKI
  • Bridge CA
  • Multi-Party/Group Protocols
  • Case Studies
  • Multi-signatures
  • Certificates Status
  • Novel Public-key Cryptosystems
  • Certification Policy and Practices
  • Optimization
  • Credentials
  • PKC e-voting schemes
  • Cross Certification
  • Policies & Regulations
  • Cryptanalysis and protocol Weaknesses
  • Privacy
  • Directories
  • Privilege Management
  • Digital Signatures
  • Protocols
  • Distributed Crypto-Computing
  • Reliability in PKI
  • eCommerce / eGovernment
  • Repositories
  • Evaluation
  • Risk & attacks
  • Fault-Tolerance and reliability
  • Standards
  • Federations
  • Threshold Cryptosystems
  • Formal methods
  • Timestamping
  • Group signatures
  • Trust management
  • Identification
  • Trusted Computing
  • Identity-Based schemes
  • Ubiquitous scenarios
  • Identity Management and eID
  • Usage Control
  • Implementations
  • Verification
  • Interoperability
  • Web services security


co-Sponsored by:

Special Issue on Mathematical & Computer Modelling in Public Key Services & Infrastructures (EUROPKI 2010)