Tag: certificate

Apr 24

9th European PKI Workshop: Research and Applications (EuroPKI 2012)

CALL FOR PAPERS
9th European PKI Workshop: Research and Applications (EuroPKI 2012)
in conjunction with ESORICS 2012
Pisa, Italy – September 13-14, 2012

The 9th European PKI Workshop: Research and Applications (EuroPKI
2012) will be held in Pisa, Italy.  The workshop seeks submissions
from academia, industry, and government presenting novel research on
all aspects of Public Key Services, Applications, and
Infrastructures. Topics of interest include, but are not limited to:

– Anonymity
– Architecture and modeling
– Attribute-based access control
– Authentication
– Authorization and delegation
– Certificates management
– Cross certification
– Directories
– eCommerce/eGovernment
– Fault-tolerance and reliability
– Federations
– Group signatures
– ID-based schemes
– Identity management
– Implementations
– Interoperability
– Key management
– Legal issues
– Long-time archiving
– Mobile PKI
– Multi-signatures
– PKI in the Cloud
– Policies and regulations
– Privacy
– Privilege management
– Protocols
– Repositories
– Risk attacks
– Scalability and performance
– Security of PKI systems
– Standards
– Timestamping
– Trust management
– Trusted computing
– Ubiquitous scenarios
– Web services security

SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap with papers that have
been published or that have been simultaneously submitted to a journal
or a conference with proceedings. All submissions should be
appropriately anonymized (i.e., papers should not contain author names
or affiliations, or obvious citations). Submissions should be at most
16 pages, including the bibliography and well-marked appendices, and
should follow the LNCS style. Submissions are to be made to the
submission web site at easychair.org. Only pdf files will be
accepted. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Papers must be received by the
deadline of May 25, 2012 (11:59 p.m. American Samoa time).  Authors
of accepted papers must guarantee that their papers will be presented
at the workshop. Pre-proceedings will be made available at the
workshop. As for all previous EuroPKI events, it is planned to have
post-proceedings published by Springer in the Lecture Notes in
Computer Science (LNCS) series.

IMPORTANT DATES
Paper submission due: May 25, 2012
Notification to authors: July 15, 2012
Camera ready due: August 1, 2012

ESORICS GENERAL CHAIR
Fabio Martinelli
CNR, Italy

PROGRAM CHAIRS
Sabrina De Capitani di Vimercati
Universita’ degli Studi di Milano, Italy

Chris Mitchell
Royal Holloway, University of London, UK

PUBLICITY CHAIR
Giovanni Livraga
Universita’ degli Studi di Milano, Italy

PROGRAM COMMITTEE
Lejla Batina, Radboud University Nijmegen, The Netherlands
David Chadwick, University of Kent, UK
Sherman S. M. Chow, University of Waterloo, Canada
Paolo D’Arco, University of Salerno, Italy
Bao Feng, Institute for Infocomm Research, Singapore
Eduardo Fernandez-Medina, Universidad de Castilla la Mancha, Spain
Simone Fischer-Huebner, Karlstad University, Sweden
Sara Foresti, Universita’ degli Studi di Milano, Italy
Steven Furnell, Plymouth University, UK
Peter Gutmann, University of Auckland, New Zealand
Ravi Jhawar, Universita’ degli Studi di Milano, Italy
Sokratis Katsikas, University of Piraeus, Greece
Dogan Kesdogan, University of Siegen, Germany
Elisavet Konstantinou, University of the Aegean, Greece
Costas Lambrinoudakis, University of Piraeus, Greece
Herbert Leitold, A-SIT, Austria
Javier Lopez, University of Malaga, Spain
Fabio Martinelli, CNR, Italy
Catherine Meadows, NRL, USA
Stig Mjolsnes, NTNU, Norway
Yi Mu, University of Wollongong, Australia
Svetla Nikova, Katholieke Universiteit Leuven, Belgium
Rolf Oppliger, eSECURITY Technologies, Switzerland
Massimiliano Pala, Polytechnic Institute, USA
Stefano Paraboschi, Universita’ degli Studi di Bergamo, Italy
Andreas Pashalidis, K.U.Leuven, Belgium
Olivier Pereira, Universite Catholique de Louvain, Belgium
Gunther Pernul, Universitat Regensburg, Germany
Sasa Radomirovic, University of Luxembourg,  Luxembourg
Pierangela Samarati, Universita’ degli Studi di Milano, Italy
Sean Smith, Dartmouth College, USA

CONFERENCE WEB PAGE: http://europki2012.dti.unimi.it
PC CHAIRS EMAIL: europki2012@unimi.it

Feb 14

Trustwave issued a man-in-the-middle certificate – The H Security: News and Features

Trustwave issued a man-in-the-middle certificate

All of the major browsers contain the Trustwave root certificate

Certificate authority Trustwave issued a certificate to a company allowing it to issue valid certificates for any server. This enabled the company to listen in on encrypted traffic sent and received by its staff using services such as Google and Hotmail. Trustwave has since revoked the CA certificate and vowed to refrain from issuing such certificates in future.

via Trustwave issued a man-in-the-middle certificate – The H Security: News and Features.

Feb 09

Trustwave admits crafting SSL snooping certificate • The Register

Trustwave admits crafting SSL snooping certificate • The Register.

Feb 09

Google to strip Chrome of SSL revocation checking

Google’s Chrome browser will stop relying on a decades-old method for ensuring secure sockets layer certificates are valid after one of the company’s top engineers compared it to seat belts that break when they are needed most.

The browser will stop querying CRL, or certificate revocation lists, and databases that rely on OCSP, or online certificate status protocol, Google researcher Adam Langley said in a blog post published on Sunday. He said the services, which browsers are supposed to query before trusting a credential for an SSL-protected address, don’t make end users safer because Chrome and most other browsers establish the connection even when the services aren’t able to ensure a certificate hasn’t been tampered with.

via Google to strip Chrome of SSL revocation checking.

Feb 08

Trustwave issued a man-in-the-middle certificate – The H Security: News and Features

Trustwave issued a man-in-the-middle certificate – The H Security: News and Features.

Dec 23

Top security incidents of 2011 – Sony PlayStation hack, security breach, security, rsa, LulzSec, Google, DigiNotar, Comodo Certificate Authority, Comodo, anonymous – CIO

Top security incidents of 2011 – Sony PlayStation hack, security breach, security, rsa, LulzSec, Google, DigiNotar, Comodo Certificate Authority, Comodo, anonymous – CIO.

Dec 16

Industry group creates guidelines for issuing SSL certs – SC Magazine US

 

 

 

 

 

 

 

Industry group creates guidelines for issuing SSL certs – SC Magazine US.

A consortium of certificate authorities (CAs) and software vendors has released the first industry standard for the issuance and management of SSL certificates.

(via Pascal M.)

 

 

 

Oct 23

ICCIT 2012 – Second International Conference on Communications and Information Technology ICCIT 2012

Deadline: January 16, 2012 When: June 26, 2012 – June 28, 2012

Where: Hammamet / Tunisia Tunisia

Updated: 15:03:00 Oct. 19, 2011 GMT+9

Call For Papers – CFP

Prospective authors are invited to submit an original full-length paper (10-point font) in IEEE format via the EDAS submissions system. Note that the maximum number of pages is 6; 5 pages plus 1 additional page allowed with a charge for the one additional page of USD100 if accepted. Submitted papers must represent original material that is not currently under review in any other conference or journal, and has not been previously published.

IEEE specification based Latex and MS-Word templates for paper submission are available here.

The program committee may designate one accepted paper per track to the conference as ICCIT-2012 Best Papers. Every submission is automatically eligible for this award. Each author on each of the selected papers will receive a certificate to be awarded at the award dinner banquet.

The conference has four tracks. Topics of interest include, but are not limited to:

Wireless Communications and Signal Processing

Wireless Cross Layer Design

Multi-Antenna and MIMO Systems

Cognitive Radio and Dynamic Spectrum Access

Broadband Wireless/ OFDM System

Broadband Wireless Techno. (LTE, WiMAX ..)

Convergence of Wireless Systems

Cognitive Radio and Dynamic Spectrum Access

Modulation, Coding, and Diversity Techniques

PHY-Layer Security

Wireless Communications Testbed Development

Signal Processing Interfaces in Cognitive Radio

Speech, Image and Video Signal Processing

Multimedia Communication Technologies

Spectrum Shaping and Filters

Transmitter and Receiver Techniques

Adaptive Antennas and Beamforming

Blind Signal Processing for Communications

Channel Estimation, Modeling and Equalization

Information Technology and Cloud Computing

Hybrid Information Technology

High Performance Computing

Cloud and Cluster Computing

Ubiquitous Networks and Wireless Communications

Digital Convergence

Multimedia Convergence

Intelligent and Pervasive Applications

Security and Trust Computing

IT Management and Service

Bioinformatics and Bio-Inspired Computing

Knowledge System and Intelligent Agent

Game and Graphics

Human-centric Computing and Social Networks

Computer Vision and Image Processing

Remote Sensing and GIS

IT Applications in different Areas

Engineering Applications of IT

Communication Networks and Systems

Cellular Systems, 3G/4G and beyond

Wireless Ad hoc, Mesh and Sensor Networks

Reconfigurable Wireless Networks

Resource Management, Mobility Management, and Admission Control

Cross-Layer Design and Optimization

Performance Analysis and QoS Provisioning

Network Planning, Capacity Analysis, and Topology Control

Monitoring and Network Management Algorithms

Fault-Tolerance and Traffic Reliability Issues

Pricing and Billing Modeling and Solutions

Optical Networking

Network Reliability, Privacy & Security

Next Generation Internet

Internet Architecture and Design

Internet Signalling and Service Enabling Protocols

Digital Information Management

Data Mining, Web Mining

E-Learning, e-Commerce, e-Business and e-Gov.

Web Metrics and its applications

XML and other extensible languages

Semantic Web, Ontologies and Rules

Artificial Intelligence and Decision Support Systems

Knowledge Management

Peer to Peer Data Management

Interoperability, Mobile Data Management

Data Exchange issues and Supply Chain

Data Life Cycle in Products and Processes

Security and Access Control

Information Content Security

Distributed Information Systems

Information Visualization, Web Services

Multimedia and Interactive Multimedia

Video Search and Video Mining

Sep 08

Microsoft revokes DigiNotar certificates from Windows, Mac users still vulnerable | Naked Security

Microsoft revokes DigiNotar certificates from Windows, Mac users still vulnerable | Naked Security.

Sep 06

SSL certificate debacle includes CIA, MI6, Mossad and Tor | Naked Security

SSL certificate debacle includes CIA, MI6, Mossad and Tor | Naked Security.