EuroPKI 2013 Springer Lecture Notes in Computer Science

10th European Workshop on Public Key Infrastructures, Services and Applications

12-13 September 2013, RHUL, Egham, UK.

in conjunction with ESORICS 2013

[Call for Paper TXT]

The 10th European PKI Workshop: Research and Applications (EuroPKI 2013) will be held in the Royal Holloway. The workshop seeks submissions from academia, industry, and government presenting novel research on all aspects of Public Key Services, Applications, and Infrastructures. This will be the tenth event in the EuroPKI Workshop series in conjunction with ESORICS 2013 (18th European Symposium on Research in Computer Security).

The European PKI Workshop series focuses on all research aspects of Public Key Services, Applications and Infrastructures. Previous EuroPKI workshops were held in: Pisa, Italy (EuroPKI 2012) Leuven, Belgium (EuroPKI 2011); Athens, Greece (EuroPKI 2010); Pisa, Italy (EuroPKI 2009); Trondheim, Norway (EuroPKI 2008); Mallorca, Spain (EuroPKI 2007); Torino, Italy (EuroPKI 2006); Kent, UK (EuroPKI 2005); and Samos, Greece (EuroPKI 2004).
  • Anonymity
  • Architecture and modeling
  • Attribute-based access control
  • Authentication
  • Authorization and delegation
  • Certificates management
  • Cross certification
  • Directories
  • eCommerce/eGovernment
  • Fault-tolerance and reliability
  • Federations
  • Group signatures
  • ID-based schemes
  • Identity management
  • Implementations
  • Interoperability
  • Key management
  • Legal issues
  • Long-time archiving
  • Mobile PKI
  • Multi-signatures
  • PKI in the Cloud
  • Policies and regulations
  • Privacy
  • Privilege management
  • Protocols
  • Repositories
  • Risk attacks
  • Scalability and performance
  • Security of PKI systems
  • Standards
  • Timestamping
  • Trust management
  • Trusted computing
  • Ubiquitous scenarios
  • Web services security
This list is not exaustive. The workshop may also accept other related topics.
Submitted papers must not substantially overlap with papers that have been published or that have been simultaneously submitted to a journal or a conference with proceedings. All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations). Submissions should be at most 18 pages, including the bibliography and well-marked appendices, and should follow the LNCS style ( Submissions are to be made to the submission web site at Only pdf files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Papers must be received by the deadline of May the 19th, 2013 (11:59 p.m. American Samoa time). Authors of accepted papers must guarantee that their papers will be presented at the workshop. Pre-proceedings will be made available at the workshop. As for all previous EuroPKI events, it is planned to have post-proceedings published by Springer in the Lecture Notes in Computer Science (LNCS) series.
IOS Journal of Computer Security
The authors of selected accepted papers will be invited to revise their work, by adding at least 25% new original material, to be published in the IOS Journal of Computer Security (
Important Dates
  • Paper submission extended: 19th May 2013 2nd June 2013
  • Notification to authors: 1st July 2013 10th July 2013
  • Camera ready due: 21st July 2013 4th August 2013
    • Sokratis Katsikas, University of Piraeus, Greece
    • Isaac Agudo, University of Malaga, Spain
    • Christopher Dadoyan, University of Piraeus, Greece
Program Committee
  • Lejla Batina, Radboud University Nijmegen, The Netherlands
  • Carlos Blanco, Universidad de Cantabria, Spain
  • David Chadwick, University of Kent, UK
  • Sherman S. M. Chow, Chinese University of Hong Kong, Hong Kong
  • Paolo D'Arco, University of Salerno, Italy
  • Sabrina De Capitani di Vimercati, Universita' degli Studi di Milano, Italy
  • Carmen Fernandez-Gago, University of Malaga, Spain
  • Simone Fischer-Huebner, Karlstad University, Sweden
  • Sara Foresti, Universita' degli Studi di Milano, Italy
  • Steven Furnell, Plymouth University, UK
  • Dimitris Geneiatakis, JRC at Institute for the Protection and Security of the Citizen, Italy
  • Stefanos Gritzalis, University of the Aegean, Greece
  • Peter Gutmann, University of Auckland, New Zealand
  • Ravi Jhawar, Universita' degli Studi di Milano, Italy
  • Georgios Kambourakis, University of the Aegean, Greece
  • Dogan Kesdogan, University of Siegen, Germany
  • Elisavet Konstantinou, University of the Aegean, Greece
  • Costas Lambrinoudakis, University of Piraeus, Greece
  • Herbert Leitold, A-SIT, Austria
  • Dimitris Lekkas, University of the Aegean, Greece
  • Javier Lopez, University of Malaga, Spain
  • Fabio Martinelli, CNR, Italy
  • Catherine Meadows, NRL, USA
  • Chris Mitchell, Royal Holloway, University of London, UK
  • Stig Mjolsnes, NTNU, Norway
  • Yi Mu, University of Wollongong, Australia
  • Svetla Nikova, Katholieke Universiteit Leuven, Belgium
  • Rolf Oppliger, eSECURITY Technologies, Switzerland
  • Massimiliano Pala, Penango, Inc., USA
  • Stefano Paraboschi, Universita' degli Studi di Bergamo, Italy
  • Andreas Pashalidis, K.U.Leuven, Belgium
  • Olivier Pereira, Universite Catholique de Louvain, Belgium
  • Gunther Pernul, Universitat Regensburg, Germany
  • Nineta Polemi, University of Pireaus, Greece
  • Sasa Radomirovic, ETH Zurich, Switzerland
  • Pierangela Samarati, Universita' degli Studi di Milano, Italy
  • Sean Smith, Dartmouth College, USA
  • Christos Xenakis, University of Pireaus, Greece
Thursday September 12th 2013 Friday September 13th 2013
08:00 - 09:00Registration
09:00 - 09:30 General Welcome (Main auditorium)
09:30 - 10:30 Session 1: KEynote speech. Fabio Martinelli (IIT-CNR) Session 5: Intrusion detection
10:30 - 11:00 Tea/Coffee Break Closing
11:00 - 13:00 Session 2: Cryptographic Protocols
13:00 - 14:15 Lunch (Windsor Foyer)
14:15 - 15:45Session 3: Digital Signatures
15:45 - 16:15Tea/Coffee Break
16:15 - 17:45Session 4: Trust - secret proving
19:00 - 20:00Pre dinner Drinks
20:00 - 23:00Workshops Dinner


Session 1: Cryptographic Protocols

Jean Lancrenon. What Public Keys Can Do for 3-Party, Password-Authenticated Key Exchange

Nicolas Buchmann and Harald Baier. Towards a more secure and scalable verifying PKI of eMRTD

Lucjan Hanzlik, Kamil Kluczniak, Lukasz Krzywiecki and Miroslaw Kutylowski. Mutual Restricted Identification

Session 2: Digital Signatures

Christina Brzuska, Henrich C. Pöhls and Kai Samelin. Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures

Johannes Braun, Franziskus Kiefer and Andreas Hülsing. Revocation & Non-Repudiation: When the first destroys the latter

Felipe Carlos Werlang, Martín Vigil and Ricardo Felipe Custódio. A User-Centric Digital Signature Scheme

Session 3: Trust – secret proving

Klaus Potzmader, Daniel Hein and Johannes Winter. STUNT: A Simple, Transparent, User-centered Network of Trust

Johannes Braun, Florian Volk, Johannes Buchmann and Max Mühlhäuser. Trust Views for the Web PKI

Sébastien Canard, Iwen Coisel, Amandine Jambert and Jacques Traore. New Results for the Practical Use of Range Proofs

Session 4: Intrusion detection

Ioanna Kantzavelou and Sokratis Katsikas. Uncertainty in Intrusion Detection Signaling Games

Georgios Spathoulas, Sokratis Katsikas and Anastasios Charoulis. A test-bed for post-processing the results of intrusion detection systems

(Last update: August 2013)