Olivier Markowitch

Author's posts

Nov 07

The 5 Best TrueCrypt Alternative Services by Joel Tope

The 5 Best TrueCrypt Alternative Services

 

 

Feb 27

Implementation aspects of Keccak

The purpose of this work is to scientifically analyze the gain obtained by implementing a parallel mode of use on top of Keccak. This includes tree hash modes and parallel authenticated encryption schemes. The student’s tasks would include:
– to model the performance of a mode as a function of its parameters;
– to measure the actual performance and to scientifically compare it to
the model;
– to propose optimal parameters or to fine-tune the mode.

Supervision: Keccak team – Director : Olivier Markowitch (ULB)

Feb 27

Side-channel aspects of Keccak-based authentication and/or encryption schemes

The purpose of this work is to analyze the sensitivity to side-channel attacks of an implementation of the Keccak-f round function, which is relevant to any FIPS 202 instance in the presence of a key, or to the Keyak or Ketje authenticated encryption schemes. The student’s tasks would include:
– to model the leakage;
– to analyze an implementation;
– to scientifically compare the obtained results to the model;
– to propose countermeasures (or improvements thereof).

Supervision: Keccak team – Director : Olivier Markowitch (ULB)

Apr 18

CALL FOR PAPERS | eDemocracy

CALL FOR PAPERS | eDemocracy.

 

e-Democracy 2015: Citizen rights in the world of the new computing paradigms 
6th International Conference on 
e-Democracy
CALL FOR PAPERS 
December 10-11, 2015, Athens, Greece
www.edemocracy2015.eu

Information and communication technologies move fast; faster than society, faster than governments, faster than the law. Connectivity is already impressive, but the near future brings about the interconnection of everything, via the Internet of Things. It also brings fundamental changes to our computing paradigm, with cloud computing gaining momentum and being expected to become the prevalent computing paradigm in the years to come. Increasingly more data are being collected, about almost everything one can imagine; and they remain there, in cyberspace, for ever, sometimes even resisting efforts to delete them. These data are so attractive that a new science, going by the name “big data” has already emerged. All these developments constitute in most cases an improvement in our everyday lives, but sometimes infringe our rights as citizens. The challenge, therefore, is to safeguard citizen rights in the face of a new era, landmarked by new computing paradigms.
This is the theme of the 6th occasion of the International Conference on e-Democracy that will be held in Athens, the cradle of democracy, on 10-11 December 2015. The conference is organized by the Scientific Council for the Information Society, in co-operation with the Hellenic Data Protection Authority and a substantial number of European and Greek universities and academia. It is intended, similarly to previous occasions, to provide a forum for presenting and debating the latest developments in the field, from a technical, political, and legal point of view.
The conference will include keynote addresses, tutorials, panels, Ph.D. colloquia and sessions, workshops, special, regular and poster sessions. All papers will be peer reviewed. Acceptance will be based on quality, relevance, and originality. Accepted papers will be published in the conference proceedings and selected papers will be invited to participate (after the necessary enhancements) to the evaluation process for inclusion in special issues of peer-reviewed journals.
The working language of the 6th International Conference on “e-Democracy ‘15: Challenges for Citizen Rights in the World of the New Computing Paradigms” is English. It is possible, however, that papers on Greek Law cases of e-Democracy issues be presented in Greek.
Topics of interest
The topics of interest include, but are not limited to, the following:

  • e-Democracy and e-Participation
      o e-Campaigning, e-Politics
      o e-Voting
      o Information and Consultation Platforms
      o Collaborative working environments for e-Democracy
      o Social computing and e-Democracy

• e-Government

    o Open and Big Data for e-Government
    o Cloud computing for e-Government
    o m-Government
    o e-Government services and administrative burdens
    o Business process modeling for e-Government systems
    o Tools and models for e-Government development
    o Case studies and European projects

• Security, Privacy and Trust

    o Security, Privacy and Trust in e-Business services
    o Security, Privacy and Trust in e-Government services
    o Security, Privacy and Trust in Online Social Network Services
    o Cloud Computing Security and Privacy
    o Identity Management, Identity Theft and Trust Management
    o Information Audit and Trust
    o Digital Rights Management
    o Trust and Reputation in Digital Environments
    o Cyber attacks and advances on network security
    o Cryptographic Technologies
    o Anonymisation Methodologies and Best Practices
    o Privacy by Design and Default Methodologies
    o Tracking Technologies and Do-Not-Track Systems
    o Privacy Impact Assessment Methodologies
    o Privacy Enhancing Location and Mobility Management
    o Security and Privacy Audit, Risk and Governance
    o Security and Data Protection Education
    o Tradeoffs between security and efficiency, usability, reliability and cost

• e-Crime, e-Fraud and Digital Forensics

    o Cyber Crime Detection and Prevention
    o Internet Fraud, Cyber War
    o Computer Forensics and Anti-forensics

• Social, legal and ethical issues

    o Digital Divide
    o Internet Addiction
    o Transparency and Accountability in Data Protection
    o Ethics in Digital Societies
    o Surveillance Technologies and Legal Implications
    o Freedom of Expression and Privacy
    o Freedom of Information and Privacy
    o Social factors of collaborative creativity

Important Dates
Full paper submission deadline: May 31, 2015
Notification of decision: July 15, 2015
Camera-ready deadline: July 30, 2015

Instructions for Authors
Submitted papers must not substantially overlap with papers that have been published or that have been simultaneously submitted to a journal or a conference with proceedings. All submissions should be appropriately anonymised (i.e., papers should not contain author names or affiliations, or obvious citations). Submissions should be at most 15 pages, including the bibliography and well-marked appendices, and should follow the LNCS style (http://www.springeronline.com/lncs). Submissions are to be made to the submission web site at https://easychair.org/conferences/?conf=edemocracy15. Only pdf files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Papers must be received by the deadline of 31 May 2015 (11:59 p.m. American Samoa time). Authors of accepted papers must guarantee that their papers will be presented at the conference. Efforts will be made to publish the conference proceedings by Springer in the Lecture Notes in Computer Science (LNCS) series.

The authors of selected accepted papers will be invited to extend their work for further publication in the Emerald journal Information and Computer Security (http://www.emeraldinsight.com/journal/ics# ).

Conference Steering Committee
Sokratis K. Katsikas, University of Piraeus, Greece (Chair)
Vassilis Zorkadis, Vice-President of SCIS, Greece (Vice-chair)
Philippos Mitletton, Secretary General of SCIS, Greece (Secretary)
Lazaros Iliadis, Democritus University of Thrace, Greece
Constantina Costopoulou, Agricultural University of Athens, Greece
Constantine Yialouris, Agricultural University of Athens, Greece
Elias Pimenidis, University of the West of England, UK
Spyros Voulgaris, Vrije Universiteit, The Netherlands
Irene Vassilaki, Board member of SCIS, Greece
Charalampos Patrikakis, Technological Educational Institute of Piraeus, Greece

Conference Honorary Chair
Alexander B. Sideridis, Agricultural University of Athens, Greece

Program Committee Chair
Sokratis K. Katsikas, University of Piraeus, Greece

Program Committee
Isaac Agudo, University of Malaga, Spain
Evgenia Alexandropoulou, University of Macedonia, Greece
Zacharoula Andreopoulou, Aristotle University of Thessaloniki, Greece
Maria Bottis, Ionian University, Greece
Christos Bouras, University of Patras, Greece
Athena Bourka, ENISA, Greece
David Chadwick, University of Kent, UK
Vassilios Chryssikopoulos, Ionian University, Greece
Nathan Clarke,University of Plymouth, UK
Tina Costopoulou, Agricultural University of Athens, Greece
Ernesto Damiani, University of Milan, Italy
Sabrina De Capitani Di Vimercati, University of Milan, Italy
Christos Douligeris, University of Piraeus, Greece
Carmen Fernández-Gago, University of Malaga, Spain
Simone Fischer-Hübner, Karlstad University, Sweden
Sara Foresti,University of Milan, Italy
Steven Furnell, University of Plymouth, UK
Jürgen Fuß,University of Applied Sciences Upper Austria,Austria
Dimitris Geneiatakis, EC Joint Research Center Ispra, Italy
Christos Georgiadis, University of Macedonia, Greece
Dimitris Gouscos, University of Athens, Greece
Stefanos Gritzalis, University of the Aegean, Greece
Mp.Gupta,Indian Institute of Technology Delhi (IIT Delhi), India
Marit Hansen,Unabhängiges Landeszentrum für Datenschutz Schleswig-Holstein, Germany
Lazaros Iliadis, Democritus University of Thrace, Greece
Dimitra Kaklamani, National Technical University of Athens, Greece
Christos Kalloniatis, University of the Aegean, Greece
Ioanna Kantzavelou, Technological Educational Institute of Athens, Greece
Maria Karyda, University of the Aegean, Greece
Vasilis Katos, Bournemouth University, UK
Spyros Kokolakis, University of the Aegean, Greece
Nicholas Kolokotronis, University of Peloponnese, Greece
Panayiotis Kotzanikolaou, University of Piraeus, Greece
Costas Lambrinoudakis, University of Piraeus, Greece
Maria Lambrou, University of the Aegean, Greece
Konstantinos Limniotis, University of Athens, Greece
Antonio Lioy, Politecnico di Torino, Italy
Javier Lopez, University of Malaga, Spain
Nikos Lorentzos, Agricultural University of Athens, Greece
Euripidis Loukis, University of the Aegean, Greece
Emmanouil Magkos, Ionian University, Greece
Vicky Manthou, University of Macedonia, Greece
Nikolaos Marianos, University of the Aegean, Greece
Giannis Marias, Athens University of Economics and Business, Greece
Olivier Markowitch, Université Libre de Bruxelles (ULB), Belgium
Vashek Matyas, Masaryk University, Czech Republic
Vojtech Merunka, Czech Technical University in Prague, Czech Republic
Lilian Mitrou, University of the Aegean, Greece
Martin Molhanec, Czech Technical University in Prague, Czech Republic
Haris Mouratidis, University of Brighton, UK
Maria Ntaliani, Agricultural University of Athens, Greece
Christoforos Ntantogian, University of Piraeus, Greece
Martin Olivier, University of Pretoria, South Africa
Rolf Oppliger, eSECURITY Technologies, Switzerland
Andreas Pashalidis, K.U.Leuven, Belgium
Charalampos Patrikakis, National Technical University of Athens, Greece
Guenther Pernul, University of Regensburg,Germany
Elias Pimenidis, University of the West of England, UK
Nineta Polemi, University of Piraeus, Greece
Bart Preneel, K.U. Leuven, Belgium
Andreja Pucihar, University of Maribor, Slovenia
Gerald Quirchmayr, University of Vienna, Austria
Muttukrishnan Rajarajan, City University, UK
Kai Rannenberg, Goethe University Frankfurt, Germany
Panagiotis Rizomiliotis, University of the Aegean, Greece
Carsten Rudolph, Fraunhofer Institute for Secure Information Technology, Germany
Christoph Ruland, University of Siegen, Germany
Pierangela Samarati, University of Milan, Italy
Einar Snekkenes, Gjovik University College, Norway
Miguel Soriano,U niversitat Politècnica de Catalunya (UPC), Spain
Diomidis Spinellis, Athens University of Economics and Business, Greece
Paul Spirakis,University of Patras, Greece
Stephanie Teufel, University of Fribourg, iimt, Switzerland
Marianthi Theocharidou, Athens University of Economics & Business, Greece
Yannis Theocharis,University of Mannheim, Germany
Aggeliki Tsochou,Ionian University, Greece
Irene Vassilaki, SCIS, Greece
Maro Vlachopoulou, University of Macedonia, Greece
Vasileios Vlachos, Technological Educational Institute of Larissa, Greece
Spyros Voulgaris, VU University Amsterdam, The Netherlands
Edgar Weippl, Vienna University of Technology, Austria
Christos Xenakis, University of Piraeus, Greece
Constantine Yialouris, Agricultural University of Athens, Greece
Jianying Zhou, Institute for infocomm research, Singapore
Vassilis Zorkadis, Hellenic Data Protection Authority, Greece
Sotiris Karetsos, Agricultural University of Athens, Greece

Download CfP

Jan 20

Secrypt 2015

CALL FOR PAPERS

International Conference on Security and Cryptography
SECRYPT website: http://www.secrypt.icete.org/

July 20 – 22, 2015
Colmar, Alsace, France

Sponsored by: INSTICC
INSTICC is Member of: WfMC, OMG and FIPA
Logistics Partner: SCITEVENTS

IMPORTANT DATES:
Regular Paper Submission: March 3, 2015
Authors Notification (regular papers): Mayl 18, 2015
Final Regular Paper Submission and Registration: May 26, 2015

You are cordially invited to submit a paper to the SECRYPT 2015 Conference, to be held in Colmar, Alsace, France. The deadline for paper submission is scheduled for March 3, 2015.

SECRYPT is an annual international conference covering research in information and communication security. The 12th International Conference on Security and Cryptography (SECRYPT 2015) will be held in Colmar, France on 20-22 July 2015.
The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography.

Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and general survey papers indicating future directions are also encouraged.

SECRYPT is interested in promoting high quality research as it can be confirmed by last year acceptance rates, where from 139 submissions, 21% of which were orally presented and 22% presented as posters.

We would like to highlight the presence of the following keynote speakers:
– Anthony C. Boucouvalas, University of Peloponnese, Greece
– Eleni Karatza, Aristotle University of Thessaloniki, Greece
– Andrew Moore, University of Cambridge, United Kingdom

Submitted papers will be subject to a double-blind review process. All accepted papers will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support.
It is planned to publish a short list of revised and extended versions of presented papers with Springer in a CCIS Series book (final approval pending).

The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP, EI (Elsevier Index) and Scopus.
All papers presented at the conference venue will be available at the SCITEPRESS Digital Library (http://www.scitepress.org/DigitalLibrary/). SCITEPRESS is a member of CrossRef (http://www.crossref.org/).

Best paper awards will be distributed during the conference closing session. Please check the website for further information (http://www.secrypt.icete.org/BestPaperAward.aspx).

Workshops, Special sessions, Tutorials as well as Demonstrations dedicated to other technical/scientific topics are also envisaged: companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat. Workshop chairs and Special Session chairs will benefit from logistics support and other types of support, including secretariat and financial support, to facilitate the development of a valid idea.

SECRYPT is part of ICETE, the 12th International Joint Conference on e-Business and Telecommunications. Registration to SECRYPT allows free access to all other ICETE conferences.

ICETE 2015 will be held in conjunction with ICINCO 2015, ICSOFT 2015, SIMULTECH 2015 and DATA 2015. Registration to ICETE allows free access to the ICINCO, ICSOFT, SIMULTECH and DATA conferences as a non-speaker.

ICETE CONFERENCE CO-CHAIRS
Mohammad S. Obaidat, Monmouth University, United States
Pascal Lorenz, University of Haute Alsace, France

PROGRAM CHAIR:
Pierangela Samarati, Universita degli Studi di Milano, Italy

PROGRAM COMMITTEE:
Please check the program committee members at http://www.secrypt.icete.org/ProgramCommittee.aspx

CONFERENCE TOPICS:

– Access Control
– Applied Cryptography
– Biometrics Security and Privacy
– Critical Infrastructure Protection
– Data Integrity
– Data Protection
– Database Security and Privacy
– Digital Forensics
– Digital Rights Management
– Ethical and Legal Implications of Security and Privacy
– Formal Methods for Security
– Human Factors and Human Behavior Recognition Techniques
– Identification, Authentication and Non-repudiation
– Identity Management
– Information Hiding
– Information Systems Auditing
– Insider Threats and Countermeasures
– Intellectual Property Protection
– Intrusion Detection & Prevention
– Management of Computing Security
– Network Security
– Organizational Security Policies
– Peer-to-Peer Security
– Personal Data Protection for Information Systems
– Privacy
– Privacy Enhancing Technologies
– Reliability and Dependability
– Risk Assessment
– Secure Software Development Methodologies
– Security and Privacy for Big Data
– Security and privacy in Complex Systems
– Security and Privacy in Crowdsourcing
– Security and Privacy in IT Outsourcing
– Security and Privacy in Location-based Services
– Security and Privacy in Mobile Systems
– Security and Privacy in Pervasive/Ubiquitous Computing
– Security and Privacy in Smart Grids
– Security and Privacy in Social Networks
– Security and Privacy in the Cloud
– Security and Privacy in Web Services
– Security and Privacy Policies
– Security Area Control
– Security Deployment
– Security Engineering
– Security in Distributed Systems
– Security Information Systems Architecture
– Security Management
– Security Metrics and Measurement
– Security Protocols
– Security requirements
– Security Verification and Validation
– Sensor and Mobile Ad Hoc Network Security
– Service and Systems Design and QoS Network Security
– Software Security
– Trust management and Reputation Systems
– Ubiquitous Computing Security
– Wireless Network Security

May 28

Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331” | Ars Technica

Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331” | Ars Technica.

Feb 16

The 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing

CALL FOR PAPERS

Paper Submission Deadline: March 18, 2013

The 2013 World Congress in Computer Science,
Computer Engineering, and Applied Computing
July 22-25, 2013, Las Vegas, USA
WORLDCOMP’13

http://www.world-academy-of-science.org/

You are invited to submit a full paper for consideration. All accepted
papers will be published in printed conference books/proceedings (ISBN)
and will also be made available online. The proceedings will be indexed
in science citation databases that track citation frequency/data for
each paper. In addition, like prior years, extended versions of selected
papers (about 35%) will appear in journals and edited research books
(publishers include: Springer, Elsevier, BMC, and others). See the
following links for a small subset of the publications based on this
Congress:
http://www.biomedcentral.com/bmcmedgenomics/supplements/6/S1
http://www.springer.com/life+sciences/bioinformatics/book/978-1-4419-7045-9
http://www.springer.com/life+sciences/bioinformatics/book/978-1-4419-5912-6
http://www.biomedcentral.com/1471-2164/9/S1/I1
http://www.biomedcentral.com/1752-0509/5?issue=S3
http://pubmedcentralcanada.ca/pmcc/articles/PMC3287490/
http://pubmedcentralcanada.ca/pmcc/articles/PMC2709251/
http://pubmedcentralcanada.ca/pmcc/articles/PMC2999338/

In addition to the above, we have arranged two new book series; one with
Elsevier publishers (Transactions on Computer Science and Applied Computing)
and another with Springer publishers (Transactions of Computational Science
and Computational Intelligence). After the conference, a significant number
of authors of accepted papers of our congress, will be given the
opportunity to submit the extended version of their papers for publication
in these books. The web sites for the two book series will be made
available after the logistics are finalized between our committee and the
publishers (both book series projects have been approved.) We anticipate
having between 10 to 20 books a year in each of these book series projects.
Each book in each series will be subject to Elsevier and Springer science
indexing products (which includes: Scopus, Ei village, SCI, …).

The Congress is composed of a number of tracks (joint-conferences,
tutorials, sessions, workshops, poster and panel discussions); all will
be held simultaneously, same location and dates: July 22-25, 2013. For
the complete list of joint conferences, see below.

IMPORTANT DATES:

March 18, 2013: Submission of full papers (about 7 pages)
April 18, 2013: Notification of acceptance (+/- two days)
May 5, 2013: Final papers + Copyright + Registration
July 22-25, 2013: The 2013 World Congress in Computer Science,
Computer Engineering, and Applied Computing
(including all affiliated conferences).

CO-SPONSORS:

Currently being prepared – The Academic Sponsors of the last offering of
the congress (2012) included research labs and centers affiliated with:
Minnesota Supercomputing Institute, USA; Argonne National Laboratory,
Illinois, USA; George Mason University, Virginia, USA; Harvard University,
Cambridge, Massachusetts, USA; Center for Cyber Defense, NCAT, North
Carolina, USA; Center for Advanced Studies in Identity Sciences (CASIS:
NC A&T, Carnegie Mellon, Clemson, UNC Wilmington), USA; Massachusetts
Institute of Technology (MIT), Cambridge, Massachusetts, USA; Texas A&M
University, USA; UMIT, Institute of Bioinformatics and Translational
Research, Austria; University of Iowa, USA; Russian Academy of Sciences,
Moscow, Russia; NDSU-CIIT Green Computing and Communications Laboratory,
USA; Medical Image HPC and Informatics Lab, Iowa, USA; and others.
Sponsors At-Large included (corporate, associations, organizations):
Intel Corporation; Super Micro Computer, Inc., California, USA; Altera
Corporation; The International Council on Medical and Care Compunetics;
International Society of Intelligent Biological Medicine; US Chapter of
World Academy of Science; High Performance Computing for Nanotechnology;
Luna Innovations; World Academy of Biomedical Sciences and Technologies;
Manx Telecom; Computer Science Research, Education, and Applications
Press; HoIP Telecom; Hodges Health; Leading Knowledge; OMG; Science
Publications and others.

SUBMISSION OF REGULAR PAPERS:

Prospective authors are invited to submit their papers by uploading them
to the evaluation web site at: http://world-comp.org . Submissions must
be uploaded by March 18, 2013 and must be in either MS doc or pdf
formats (about 7 pages including all figures, tables, and references –
single space, font size of 10 to 12). All reasonable typesetting formats
are acceptable (later, the authors of accepted papers will be asked to
follow a particular typesetting format to prepare their final papers for
publication.) Papers must not have been previously published or currently
submitted for publication elsewhere. The first page of the paper should
include: title of the paper, name, affiliation, postal address, and email
address for each author. The first page should also identify the name of
the Contact Author and a maximum of 5 topical keywords that would best
represent the content of the paper. The name of the conference that the
paper is being submitted for consideration must also be stated on the
first page of the paper as well as a 100 to 150-word abstract. The length
of the final/Camera-Ready papers (if accepted) will be limited to 7
(two-column IEEE style) pages.

Each paper will be peer-reviewed by two experts in the field for
originality, significance, clarity, impact, and soundness. In cases of
contradictory recommendations, a member of the conference program
committee would be charged to make the final decision (accept/reject);
often, this would involve seeking help from additional referees. Papers
whose authors include a member of the conference program committee will
be evaluated using the double-blinded review process. (Essay/philosophical
papers will not be refereed but may be considered for discussion/panels).

The proceedings will be published in printed conference books (ISBN) and
will also be made available online. The proceedings will be indexed in
science citation databases that track citation frequency/data for each
published paper. Science citation databases include: Inspec / IET / The
Institute for Engineering & Technology; The French National Center for
Scientific Research, CNRS, INIST databases, PASCAL (accessable from INIST,
Datastar, Dialog, EBSCO, OVID, Questel.Orbit, Qwam, & STN International);
P3P8PCTD70148 and others. Though, there is no guarantee that the
proceedings will also be included in SCI EI Compendex/Elsevier indexings;
in the past, the proceedings were included in these databases. Therefore,
we will also be sending the proceedings for indexing procedures to SCI EI
Compendex/ Elsevier. The printed proceedings/books will be available for
distribution on site at the conference.

In addition to the above, we have arranged two new book series; one with
Elsevier publishers (Transactions on Computer Science and Applied Computing)
and another with Springer publishers (Transactions of Computational Science
and Computational Intelligence). After the conference, a significant number
of authors of accepted papers of our congress, will be given the
opportunity to submit the extended version of their papers for publication
in these books. We anticipate having between 10 to 20 books a year in each
of these book series projects. Each book in each series will be subject to
Elsevier and Springer science indexing products (which includes: Scopus,
Ei village, SCI, …).

SUBMISSION OF POSTER PAPERS:

Poster papers can be 2 pages long. Authors are to follow the same
instructions that appear above (see, SUBMISSION OF REGULAR PAPERS) except
for the submission is limited to 2 pages. On the first page, the author
should state that “This paper is being submitted as a poster”. Poster
papers (if accepted) will be published if and only the author of the
accepted paper wishes to do so.

LIST OF CONFERENCES (alphabetical order based on conference acronym)

o BIOCOMP’13:
The 14th International Conference on Bioinformatics & Computational
Biology
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/biocomp13

o CDES’13:
The 13th International Conference on Computer Design
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/cdes13

o CGVR’13:
The 17th International Conference on Computer Graphics & Virtual
Reality
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/cgvr13

o CSC’13:
The 10th International Conference on Scientific Computing
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/csc13

o DMIN’13:
The 9th International Conference on Data Mining
http://www.dmin-2013.com/

o EEE’13:
The 12th International Conference on e-Learning, e-Business,
Enterprise Information Systems, and e-Government
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/eee13

o ERSA’13:
The 13th International Conference on Engineering of Reconfigurable
Systems and Algorithms
http://ersaconf.org/ersa-news/

o ESA’13:
The 11th International Conference on Embedded Systems and
Applications
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/esa13

o FCS’13:
The 9th International Conference on Foundations of Computer Science
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/fcs13

o FECS’13:
The 9th International Conference on Frontiers in Education: Computer
Science and Computer Engineering
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/fecs13

o GCA’13:
The 9th International Conference on Grid & Cloud Computing and
Applications
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/gca13

o GEM’13:
The 10th International Conference on Genetic & Evolutionary Methods
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/gem13

o ICAI’13:
The 15th International Conference on Artificial Intelligence
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/icai13

o ICOMP’13:
The 14th International Conference on Internet Computing and Big Data
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/icomp13

o ICWN’13:
The 12th International Conference on Wireless Networks
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/icwn13

o IKE’13:
The 12th International Conference on Information & Knowledge Engineering
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/ike13

o IPCV’13:
The 17th International Conference on Image Processing, Computer Vision,
& Pattern Recognition
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/ipcv13

o MSV’13:
The 10th International Conference on Modeling, Simulation and
Visualization Methods
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/msv13

o PDPTA’13:
The 19th International Conference on Parallel and Distributed
Processing Techniques and Applications
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/pdpta13

o SAM’13:
The 12th International Conference on Security and Management
http://sam.udmercy.edu/sam13/

o SERP’13:
The 11th International Conference on Software Engineering Research
and Practice
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/serp13

o SWWS’13:
The 12th International Conference on Semantic Web and Web Services
http://www.worldacademyofscience.org/worldcomp13/ws/conferences/swws13

July 22-25, 2013, Las Vegas, USA.

All conferences listed above will be held simultaneously; ie, same location
and dates.

MEMBERS OF PROGRAM AND ORGANIZING COMMITTEES:

Currently being finalized. The members of the Steering Committee of
The 2012 congress included: Dr. Selim Aissi, (formerly: Chief
Strategist – Security, Intel Corporation, USA) Senior Business Leader &
Chief Architect, Visa Corporation, USA; Prof. Babak Akhgar, PhD, FBCS,
CITP, Professor of Informatics, Sheffield Hallam University, Sheffield,
UK; Prof. Hamid R. Arabnia, Professor of Computer Science, Elected
Fellow of ISIBM, Editor-in-Chief of Journal of Supercomputing (Springer),
University of Georgia, USA; Prof. Kevin Daimi, Professor of Computer
Science, Director of Computer Science and Software Engineering Programs,
Department of Mathematics, Computer Science and Software Engineering,
University of Detroit Mercy, Detroit, Michigan, USA; Prof. Gerry Vernon
Dozier, Professor of Computer Science, Chair of Department of Computer
Science and Director of Center for Advanced Studies in Identity Sciences,
Center for Cyber Defense, North Carolina A&T State University, NC, USA;
Dr. Michael R. Grimaila, Associate Professor, Air Force Institute of
Technology, Systems Engineering, Fellow of ISSA, CISM, CISSP, IAM/IEM,
Editorial Board of ISSA Journal, Air Force Center of Cyberspace Research,
Advisor to the Prince of Wales Fellows & Prince Edward Fellows at MIT and
Harvard Universities and PC member of NATO Cooperative Cyber Defence
Centre of Excellence (CCD COE); Prof. Kun Chang Lee, Professor of MIS and
WCU Professor of Creativity Science, Business School and Department of
Interaction Science, Sungkyunkwan University, Seoul, South Korea; Prof.,
Dr., Dr.h. Victor Malyshkin, Head of Supercomputer Software Department
(SSD), Institute of Computational Mathematics and Mathematical Geophysics,
Russian Academy of Sciences, Russia; Prof. George Markowsky, Professor and
Chair of Computer Science, Associate Director of School of Computing and
Information Science, Chair of International Advisory Board of IEEE IDAACS
and Director 2013 Northeast Collegiate Cyber Defense Competition, Chair
Bangor Foreign Policy Forum, Cooperating Professor of Mathematics &
Statistics Department UMaine, Cooperating Professor of School of Policy &
International Affairs UMaine, University of Maine, Orono, Maine, USA;
Prof. Andy Marsh, Director of HoIP, Director of HoIP Telecom, UK,
Secretary-General of WABT, Vice-president of ICET, Visiting Professor,
University of Westminster, UK; Prof. James J. (Jong Hyuk) Park, Professor
of Computer Science and Engineering, Seoul National University of Science
and Technology (SeoulTech), Korea, President of KITCS, Presidentof FTRA,
Editor-in-Chiefs of HCIS, JoC and IJITCC Journals; Ashu M. G. Solo
(Publicity Chair), Fellow of British Computer Society, Principal R&D
Engineer, Maverick Technologies America; Prof. Sang C. Suh, Head and
Professor of Computer Science, Vice President, of Society for Design and
Process Science (SDPS), Director of Intelligent Cyberspace Engineering
Lab (ICEL), Texas A&M University, Com., Texas, USA; Prof. Layne T. Watson,
IEEE Fellow, NIA Fellow, ISIBM Fellow, Fellow of The National Institute
of Aerospace, Virginia Polytechnic Institute & State University, Virginia,
USA.

The 2013 Program Committee for individual conferences are currently being
compiled. Many who have already joined the committees are renowned leaders,
scholars, researchers, scientists and practitioners of the highest ranks;
many are directors of research labs., fellows of various societies, heads/
chairs of departments, program directors of research funding agencies, as
well as deans and provosts.

Program Committee members are expected to have established a strong and
documented research track record. Those interested in joining the Program
Committee should email editor@world-comp.org the following information
for consideration/evaluation: Name, affiliation and position, complete
mailing address, email address, a one-page biography that includes
research expertise & the name of the conference(s) offering to help with.

GENERAL INFORMATION:

The Congress will be composed of research presentations, keynote
lectures, invited presentations, tutorials, panel discussions, and
poster presentations. In recent past, keynote/tutorial/panel speakers
have included: Prof. David A. Patterson (pioneer, architecture, U. of
California, Berkeley), Dr. K. Eric Drexler (known as Father of
Nanotechnology), Prof. John H. Holland (known as Father of Genetic
Algorithms; U. of Michigan), Prof. Ian Foster (known as Father of Grid
Computing; U. of Chicago & ANL), Prof. Ruzena Bajcsy (pioneer, VR, U.
of California, Berkeley), Prof. Barry Vercoe (Founding member of MIT
Media Lab, MIT), Dr. Jim Gettys (known as X-man, developer of X Window
System, xhost; OLPC), Prof. John Koza (known as Father of Genetic
Programming, Stanford U.), Prof. Brian D. Athey (NIH Program Director,
U. of Michigan), Prof. Viktor K. Prasanna (pioneer, U. of Southern
California), Dr. Jose L. Munoz (NSF Program Director and Consultant),
Prof. Jun Liu (pioneer, Broad Institute of MIT & Harvard U.),
Prof. Lotfi A. Zadeh (Father of Fuzzy Logic), Dr. Firouz Naderi (Head,
NASA Mars Exploration Program/2000-2005 and Associate Director, Project
Formulation & Strategy, Jet Propulsion Lab, CalTech/NASA; Director,
NASA’s JPL Solar System Exploration), Prof. David Lorge Parnas (Fellow
of IEEE, ACM, RSC, CAE, GI; Dr.h.c.: ETH Zurich, Prof. Emeritus,
McMaster U. and U. of Limerick), Prof. Eugene H. Spafford (Executive
Director, CERIAS and Professor, Purdue University), Dr. Sandeep
Chatterjee (Vice President & Chief Technology Officer, SourceTrace
Systems, Inc.), Prof. Haym Hirsh (Rutgers University, New Jersey, USA
and former director of Division of Information and Intelligent Systems,
National Science Foundation, USA), Dr. Flavio Villanustre (Vice-
President, HPCC Systems), and many other distinguished speakers. To
get a feeling about the conferences’ atmosphere, see the 2012
delegates photos available at:
http://infinitydempsey.smugmug.com/WorldComp

An important mission of The Congress is “Providing a unique platform for
a diverse community of constituents composed of scholars, researchers,
developers, educators, and practitioners. The Congress makes concerted
effort to reach out to participants affiliated with diverse entities
(such as: universities, institutions, corporations, government agencies,
and research centers/labs) from all over the world. The congress also
attempts to connect participants from institutions that have teaching as
their main mission with those who are affiliated with institutions that
have research as their main mission. The congress uses a quota system to
achieve its institution and geography diversity objectives.”

One main goal of the congress is to assemble a spectrum of affiliated
research conferences, workshops, and symposiums into a coordinated
research meeting held in a common place at a common time. This model
facilitates communication among researchers in different fields of
computer science, computer engineering, and applied computing. The
Congress also encourages multi-disciplinary and inter-disciplinary
research initiatives; ie, facilitating increased opportunities for
cross-fertilization across sub-disciplines.

MEASURABLE SCIENTIFIC IMPACT OF CONGRESS:

As of December 2012, papers published in the conference proceedings that
are currently being held as part of WORLDCOMP, have received over 27,000
citations (includes about 2,000 self-citations). Citation data obtained
from http://academic.research.microsoft.com/ .

CONTACT:

Inquiries should be sent to: sc@world-comp.org

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Feb 13

PROOFS: Security Proofs for Embedded Systems

Call for papers: PROOFS 2013
http://www.proofs-workshop.org/

PROOFS: Security Proofs for Embedded Systems
Santa Barbara, CA, USA — Saturday, August 24th, 2013

Goal of the Workshop

The goal of the PROOFS workshop is to promote methodologies that increase the confidence level in the security of embedded systems, especially those that contain cryptographic mechanisms.
Embedded system security currently consists mainly in security by obscurity solutions. This has obvious drawbacks:

* it requires costly black-box evaluation,
* there is no certainty about the correctness of the security, etc.

Formal methods allow to increase the trust level of digital systems. They are very appealing, for the following reasons:

* they are mature in theory, and there are tried and tested methods and tools,
* they have been applied on software for a long time, mainly for safety and conformance tests.

Some important security features (random number generation, physically unclonable functions, etc. ) rely on analog devices. Their correct functioning can be ascertained by techniques such as physical modeling and unitary experimental testing.
An important objective for the PROOFS workshop is to bridge the gap between both topics, and therefore to pave the way to « security by clarity » for embedded systems.

Venue

PROOFS will take place at Santa Barbara, CA, USA on Aug 24th, 2013.

Agenda

The workshop will feature two/three invited talks and contributed talks.

* Submission deadline : Sunday May 26th, 2013
* Authors notification : Sunday July 28th, 2013
* Final version due : Sunday August 11th, 2013
* PROOFS workshop venue : Saturday August 24th, 2013

Programme Committee

* Alessandro Barenghi, Politecnico di Milano, Italy.
* Loïc Correnson, CEA LIST, France.
* Emmanuelle Encrenaz, LIP6, France.
* Naofumi Homma, Tohoku U., Japan.
* Éliane Jaulmes, ANSSI, France.
* Gerwin Klein, NICTA, Australia.
* Debdeep Mukhopadhyay, IIT Kharagpur, India.
* Svetla Nikova, K.U.Leuven, Belgium.
* Bruno Robisson, ENSMSE, France.
* Graham Steel, LSV, France.
* Medhi Tibouchi, NTT, Japan.

Steering committee

* Sylvain Guilley, TELECOM-ParisTech, France.
* Çetin Kaya Koç, UCSB, USA.
* David Naccache, ENS, France.
* Akashi Satoh, AIST, Japan.
* Werner Schindler, BSI, Germany.

Local Committee

* Jean-Luc Danger, TELECOM-ParisTech, France.
* Çetin Kaya Koç, UCSB, USA.

Feb 05

Security and Privacy in Healthcare IT Special track in The 26th International Symposium on Computer-Based Medical System

Dear all, the paper submission deadline of CBMS 2013 was extended
along with its special tracks. Therefore the new deadline for paper
submission of SPH2013 (a special track of the CBMS 2013) was also
extended to February 21st.

Security and Privacy in Healthcare IT Special track in
The 26th International Symposium on Computer-Based Medical System;
June 20-22, Porto, Portugal.

Paper submission February 21, 2013 at:
https://www.easychair.org/conferences/?conf=cbms2013

Notification of acceptance March 31, 2013

Camera-ready and registration April 24, 2013

Special track website: http://www.dcc.fc.up.pt/sph.cbms2013/
Email: sph.cbms2013@dcc.fc.up.pt
http://cbms2013.med.up.pt/

Call for papers:

We are currently witnessing a rapidly moving transition trend towards
electronic healthcare information systems. They have already proved
to be essential tools in order to improve the management and quality
of healthcare services. More recently, these systems have also
started to promote great results on the improvement of patients’
health by enabling the creation of much more flexible, efficient and
interoperable means by which practitioners and even patients can have
access and manage healthcare data. However very complex technical
challenges resulting from strict but necessary highly regulated
environments, threats to patient safety, privacy, and security must
be tackled and solved before we can safely have valuable and
sensitive patients’ data being securely managed and used in much more
flexible and potentially useful ways. Towards this end it is thus
imperative to develop innovative methods and policies that ensure the
secure acquisition and management of healthcare data, at the same
time promoting its interoperability, its’ sharing, and its integrity
and confidentiality in highly effective and secure ways.

This special track focuses on original unpublished research on
innovative methods, policies and concerns that can constitute the
right building blocks for a new generation of electronic healthcare
information systems that are at the same time more efficient,
empowering and secure. So, it is expected novel articles about
privacy, security, accountability and auditing for the healthcare
sector. This special track also pretends to encourage the research
dissemination to the stakeholders involved in healthcare information
technologies, promoting the discussion on issues, challenges and
solutions that are currently being developed all around the world.

Topics of interest include, but are not limited to:

* Access control and consent management models;
* Authentication and identification concepts;
* Security and privacy concerns in healthcare;
* Biometrics in healthcare;
* Health data protection;
* Policy and Legal aspects of regulating privacy of health data;
* Healthcare in cloud computing;
* Mobile devices and their use in healthcare information systems;
* Patient empowerment;
* Personal health records;
* Usability and human factors;

The most relevant articles will be invited to submit an extended
version on the Journal of Health, Policy and Technology published by
Elsevier.

Each contribution must be prepared following the IEEE two-column
format, and should not exceed the length of six Letter-sized pages;
the authors may use LaTeX or Microsoft Word templates when preparing
their drafts. The papers should be submitted electronically before
the paper submission deadline using the EasyChair online submission
system. Papers must be submitted in PDF format, with fonts embedded.

All submissions will be peer-reviewed by at least two reviewers. The
SPH2013 program committee will be responsible for the final decision
about acceptance of articles submitted. All accepted papers will be
included in the conference proceedings, and will be published by the
IEEE. At least one author must pay the registration fee for each
accepted paper. Please refer to the IEEE IPR guidelines concerning
copyright. Authors of accepted papers must include a completed IEEE
Copyright Form with the submission of their final camera-ready paper.

– – – – – – – – — Track Chairs —

* Manuel Eduardo Correia,
Faculty of Sciences of University of Porto (FCUP)

* Luis Filipe Antunes,
Faculty of Sciences of University of Porto (FCUP)

* Ana Margarida Ferreira,
SnT research centre of University of Luxembourg

* Cátia Santos Pereira,
Faculty of Medicine of University of Porto (FMUP)

* Alexandre Barbosa Augusto,
Faculty of Sciences of University of Porto (FCUP)

– – – – – – – – — Program Committee —

Alexander Hörbst,
The Health & Life Sciences University,
Austria.

Andreas Pashalidis,
Katholieke Universiteit Leuven,
Belgium.

Carla Simone,
Fac. di scienze mat. fis. e naturali, University of
Milano-Bicocca,
Italy.

Carlos Ribeiro,
Instituto Superior Técnico, Universidade Técnica de Lisboa,
Portugal.

David Chadwick,
School of Computing, University of Kent,
United Kingdom.

Elske Ammenwerth,
University for Health Sciences, Medical Informatics and
Technology,
Austria.

Francesco Pinciroli,
Dipartimento di Bioingegneria, Politecnico di Milano,
Italy.

Frédéric Cuppens,
Dépt. Réseaux et Services Multimédias, l’ENST-Bretagne,
France.

Gabriele Lenzini,
SnT research centre of University of Luxembourg,
Luxembourg.

Gansen Zhao,
Sun Yat-sen University,
China.

Gianluigi Me,
Computer Engineering Faculty, Università di Roma,
Italy.

Guillermo Navarro-Arribas,
Universitat Autònoma de Barcelona,
Spain.

Henrique Santos,
Universidade do Minho,
Portugal.

Isaac Agudo,
Computer Science Department, University of Malaga,
Spain.

Jonathan Fistein,
Member of the British Computer Society,
United Kingdom.

John Mantas
University of Athens,
Greece

Kambiz Ghazinour,
University of Ottawa,
Canada.

Lenka Lhotská,
Faculty of Electrical Eng., Czech Technical University,
Czech Republic.

Maria João Campos,
SPMS,
Portugal

Maria Hägglund,
Karolinska Institutet Health Informatics Centre,
Sweden.

Miria Koshy,
Warwick Business School,
United Kingdom.

Olivier Markowitch,
Computer Sciences Department of the Université
Libre de Bruxelles,
Belgium.

Panagiotis Bamidis,
Medical School, Aristotle University of Thessaloniki,
Greece.

Peter Pharow,
Fraunhofer IDMT,
Germany.

Pierangela Samarati,
Dpt. of Computer Science, Università degli Studi di Milano,
Italy.

Sergi Robles,
Universitat Autònoma de Barcelona,
Spain.

Simão Melo de Sousa,
Dep. de Informática, Universidade da Beira Interior,
Portugal.

Steven Furnell,
Faculty of Science and Technology, Plymouth University,
United Kingdom.

Vivian Vimarlund,
Dept. of Computer and Inf. Science, Linköping University,
Sweden.

Feb 01

Seventh International Workshop on Secure Software Engineering (SecSE 2013)

Seventh International Workshop on Secure Software Engineering (SecSE 2013)
http://www.distrinet.cs.kuleuven.be/events/secse2013

Regensburg, Germany, September 3, 2013
In conjunction with ARES 2013
http://www.ares-conference.eu/conf/

Call for Papers

Introduction
========
Software is about protecting information and ensuring that systems continue to
function correctly even when under malicious attack. The traditional approach
of securing a system has been to create defensive walls such as intrusion
detection systems and firewalls around it, but there are always cracks in
these walls, and thus such measures are no longer sufficient by themselves. We
need to be able to build better, more robust and more “inherently” secure
systems, and we should strive to achieve these qualities in all software
systems, not just in the ones that “obviously” need special protection.

This workshop will focus on techniques, experiences and lessons learned for
engineering secure and dependable software.

Topics
====
Suggested topics include, but are not limited to:
– Secure architecture and design
– Security in agile software development
– Aspect-oriented software development for secure software
– Security requirements
– Risk management in software projects
– Secure implementation
– Secure deployment
– Testing for security
– Quantitative measurement of security properties
– Static and dynamic analysis for security
– Verification and assurance techniques for security properties
– Security and usability
– Design and deployment of secure services
– Secure composition and adaptation of services
– Teaching secure software development
– Lessons learned
– Experience reports on successfully attuning developers to secure software
engineering

Important Dates
==========
– March 30, 2013: Submission Deadline
– May 7, 2013: Author Notification
– June 1, 2013: Camera Ready and Author Registration
– September 3, 2013: Workshop

Submission Guidelines
==============
Papers have a page limit of 10 pages and must adhere to the CPS Proceedings
Manuscripts style (two columns, single-spaced, including figures and references,
using 10 pt fonts, and number each page). Please consult the CPS Author
Guidelines (http://www.computer.org/portal/web/cscps/formatting) for more
information.

Journal Special Issue
=============
Distinguished papers submitted to SecSE will be invited to submit revised and
extended versions for publication in the International Journal of Secure
Software Engineering (ISSN 1947-3036).

Workshop Chairs
===========
– Martin Gilje Jaatun, SINTEF ICT, Norway
– Lillian Røstad, Norwegian University of Science and Technology (NTNU), Norway
– Riccardo Scandariato, KU Leuven, Belgium