Tag: architectures

Nov 10

Workshop on Cryptographic Hardware and Embedded Systems CFP

 

+————————————————————————-

!                                                                        

!                                    CHES 2012 

!                             

!                       Workshop on Cryptographic Hardware

!                               and Embedded Systems   

!                    

!                                 Leuven, Belgium                           

!                               9-12 September 2011          

!                                                                        

+————————————————————————-+

 

Important Dates

===============

 

  Submission deadline:      March 5, 2012, 23:59 PST

  Acceptance notification:  May 14, 2012

  Final version due:        June 18, 2012

  Workshop presentations:   September 9-12, 2012

 

 

Background, aim and scope

=========================

 

     CHES covers new results on all aspects of the design and analysis of cryptographic hardware and software implementations. The workshop builds a bridge between the cryptographic research community and the cryptographic engineering community. With participants from industry, academia, and government organizations, the number of participants has grown to over 300 in recent years.

 

     In addition to a track of high-quality presentations, CHES 2012 will offer invited talks, tutorials, a poster session, and a rump session. CHES 2012 especially encourages submissions on the following two subjects: DESIGN METHODS TO BUILD SECURE AND EFFICIENT HARDWARE OR SOFTWARE and LEAKAGE RESILIENT CRYPTOGRAPHY INCLUDING NEW MODEL DEFINITIONS AND ANALYSIS AND THE DESIGN OF NEW CRYPTOSYSTEMS. All submitted papers will be reviewed by at least four Program Committee members.

    

     This year, authors will be invited to submit brief rebuttals of the reviews before the final acceptances are made.

 

 

TOPICS

======

 

The topics of CHES 2012 include but are not limited to:

 

 

Cryptographic implementations

 

– Hardware architectures for public-key, secret-key and hash algorithms

– Cryptographic processors and co-processors

– Hardware accelerators for security protocols (security processors, network processors, etc.)

– True and pseudorandom number generators

– Physical unclonable functions (PUFs)

– Efficient software implementations of cryptography

 

 

Attacks against implementations and countermeasures against these attacks

 

– Side channel attacks and countermeasures

– Fault attacks and countermeasures

– Hardware tampering and tamper-resistance

 

 

Tools and methodologies

 

– Computer aided cryptographic engineering

– Verification methods and tools for secure design

– Metrics for the security of embedded systems

– Secure programming techniques

– FPGA design security

– Formal methods for secure hardware

 

 

Interactions between cryptographic theory and implementation issues

 

– New and emerging cryptographic algorithms and protocols targeting embedded devices

– Special-purpose hardware for cryptanalysis   

– Leakage resilient cryptography

 

 

Applications

 

– Cryptography in wireless applications (mobile phone, WLANs, etc.)

– Cryptography for pervasive computing (RFID, sensor networks, smart devices, etc.)

– Hardware IP protection and anti-counterfeiting

– Reconfigurable hardware for cryptography

– Smart card processors, systems and applications

– Security in commercial consumer applications (pay-TV, automotive, domotics, etc.)

– Secure storage devices (memories, disks, etc.)

– Technologies and hardware for content protection

– Trusted computing platforms

 

 

Instructions for CHES Authors

=============================

 

Authors are invited to submit original papers via electronic submission. Details of the electronic submission procedure will be posted on the CHES webpage when the system is activated. The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. It should begin with a title, a short abstract, and a list of keywords. The paper should be at most 12 pages (excluding the bibliography and clearly marked appendices), and at most 18 pages in total, using at least 11-point font and reasonable margins. Submissions not meeting these guidelines risk rejection without consideration of their merits. All submissions will be blind-refereed. Only original research contributions will be considered. Submissions which substantially duplicate work that any of the authors have published elsewhere, or have submitted in parallel to any other conferences or workshops that have proceedings will be instantly rejected. The IACR Policy on Irregular Submissions (http://www.iacr.org/irregular.html) will be strictly enforced.

 

 

Poster Session

==============

 

The CHES technical sessions will include a slot for a poster session, open to any submitter.

 

Arrangements for submitting posters will be announced later.

 

Tutorial Sessions

=================

 

The program chairs welcome suggestions for half-day tutorials at ches2012programchairs@iacr.org

 

 

Program Committee

=================

 

To be announced!

 

Organizational Committee

========================

 

All correspondence and/or questions should be directed to either of the Organizational Committee members:

 

Program co-Chairs:

 

  Emmanuel Prouff

  Oberthur Technologies (France)

  Email: ches2012programchairs@iacr.org

 

and

 

  Patrick Schaumont

  Virginia Tech (USA)

  Email: ches2012programchairs@iacr.org

 

General co-Chairs:

 

  Lejla Batina

  Radboud University Nijmegen (Netherlands) and K.U. Leuven (Belgium)

  Email: lejla@cs.ru.nl

 

and

 

  Ingrid Verbauwhede

  K.U. Leuven (Belgium)

  Email: Ingrid.Verbauwhede@esat.kuleuven.be

 

Workshop Proceedings

====================

 

The proceedings will be published in the Springer Lecture Notes in Computer Science (LNCS) series in time for distribution at the workshop. Accepted papers should follow the LNCS default author instructions at URL http://www.springer.de/comp/lncs/authors.html (see file typeinst.pdf).  In order to be included in the proceedings, the authors of an accepted paper must guarantee to present their contribution at the workshop.

Sep 27

IEEE SYSTEMS JOURNAL Special Issue on Security and Privacy in Complex Systems

***Deadline approaching – October 1, 2011***


CALL FOR PAPERS


IEEE SYSTEMS JOURNAL
Special Issue on Security and Privacy in Complex Systems


Today's information society relies on a globally interconnected
infrastructure composed of diverse and widely distributed systems. It
is of utmost importance to ensure proper protection to such complex
systems, or systems-of-systems, to ensure security, privacy, and
availability of the infrastructure as well as of resources and
information it provides and manages. The problem is far from trivial,
due to the criticality and the social impact of the applications and
services relying on this global infrastructure, as well as the
complexity given by the co-existence and co-operation of, possibly
heterogeneous, component systems.
The goal of this special issue is to collect high-quality
contributions on security and privacy in complex systems and
systems-of-systems. We solicit submissions from academia, industry,
and government presenting novel and original research on all
theoretical and practical aspects of security and privacy in complex
systems. The focus of the special issue spans security and privacy
theory, technology, methodology, and applications in complex systems.
Submitted papers should therefore explicitly address issues in the
complex system scenario. Topics of interest include, but are not
limited, to the ones listed below provided that they are treated
with specific focus on the complex system scenario.

– access control
– anonymity
– applied cryptography
– authentication
– biometric security and privacy
– cyber warfare and security
– complex systems security
– computer forensics
– critical infrastructure protection
– data and application security
– data protection
– data/system integrity
– dependability, reliability, and availability
– formal methods for security and privacy
– human factors in security and privacy
– identity management
– insider threats
– intrusion detection and prevention
– knowledge extraction/representation for security
– legal and ethical issues
– middleware security
– network security
– operating systems security and privacy
– protection from cyberhacking
– security engineering
– secure environments and applications
– secure interoperability
– security and privacy metrics
– security and privacy policies
– security and privacy in cloud computing
– security and privacy in ad hoc networks
– security and privacy in e-services
– security and privacy in grid computing
– security and privacy in mobile systems
– security and privacy in monitoring systems
– security and privacy in industrial systems
– security and privacy in pervasive/ubiquitous computing
– security and privacy in sensor networks
– security and privacy in smart grid and distributed generation systems
– security and privacy in social applications and networks
– security and privacy in wireless sensor networks
– security architectures
– security management in complex scenarios
– social implications of security and privacy
– surveillance systems
– threats, vulnerabilities, and risk management
– transportation systems
– trust management
– usable security for complex systems
– verification and validation of complex systems
– web service security


Submitted papers must not be simultaneously submitted to a journal or a
conference with proceedings. Extended versions of prior work should provide
sufficient novel and original technical content; prior publications should
be explicitly referenced in the bibliography, and comparison and added
value with respect to prior publications should be discussed in the text.
All manuscripts for this special issue should be uploaded via the IEEE
Systems Journal Web site (http://www.systemsjournal.org), in the section
dedicated to the special issue, by the deadline of October 1, 2011, and
should follow formatting and submission instructions available at the
Web site. For any questions on the special issue, send email to
pierangela.samarati@unimi.it.


GUEST EDITORS
Sushil Jajodia
George Mason University, USA
jajodia@gmu.edu

Pierangela Samarati
Universita` degli Studi di Milano, Italy
pierangela.samarati@unimi.it


IMPORTANT DATES
Paper submission due: October 1, 2011
First notification to authors: January 15, 2012
Revised paper submission due: March 15, 2012
Second notification to authors: April 30, 2012
Publication date: 2012

Sep 01

IEEE Publication – Journal Special Issues

 

Deadline for Paper Submission: September 20, 2011
Notification of Acceptance: October 15, 2011
Camera ready submission and author registration: October 31, 2011
 
Publication: IEEE
 
Journal Special Issues:
————————————-
 
Authors of accepted papers presented at IAS 2011 will be invited to submit extended versions of their manuscripts for consideration in the following international journals:
Journal of Information Assurance and Security, USA
International Journal of Wireless and Mobile Computing (IJWMC),
Inderscience Publishers, Switzerland
International Journal of Computer Information Systems and Industrial
Management (IJCISIM), USA
 
 
**************************************************************************
 
7th International Conference on Information Assurance and Security (IAS'11)
Melaka, Malaysia
December 5-8, 2011
 
 
 
Technically Sponsored by:
————————————-
 
IEEE Systems, Man and Cybernetics Society (SMCS) – Spain Chapter
IEEE Systems, Man and Cybernetics Society (SMCS) – Czechoslovakia Chapter
 
 
Technically Supported by:
————————————-
IEEE Systems, Man and Cybernetics Society (SMCS) – Technical Committee on Soft Computing Systems, Man and Cybernetics Society (SMCS) – Technical Committee on Homeland Security
 
 
Publication: IEEE
————————-
 
 
Objective:
Information assurance and security has become an important research issue in networked and distributed information sharing environments. Finding effective ways to protect information systems, networks and sensitive data within the critical information infrastructure is challenging even with the most advanced technology and trained professionals. The International Symposium on Information Assurance and Security (IAS) aims to bring together researchers, practitioners, developers, and policy makers involved in multiple disciplines of information assurance and security to exchange ideas and to learn the latest development in this important field. The 4-day conference will feature prominent keynote speakers, workshop, tutorials, poster and paper presentation in parallel tracks. HIS 2011 invites novel contributions/papers of Information Assurance and Security from fundamental aspects to various practical applications.
 
Topics:
 
** Information Assurance, Security Mechanisms, Methodologies and Models **
 
Authentication and Identity
Management Authorization and Access Control
Trust Negotiation, Establishment and Management
Anonymity and User Privacy
Data Integrity and Privacy
Network Security
Operating System Security
Database Security
Intrusion Detection
Security Attacks
Security Oriented System Design
Security and Performance trade-off
Security Management and Strategy
Security Verification, Evaluations and Measurements
Secure Software Technologies
New Ideas and Paradigms for Security
Cryptography
Cryptographic Protocols
Key Management and Recovery
 
 
** Secure System Architectures and Security Application **
 
Web Services Security
Grid Security
Ubiquitous Computing Security
Mobile Agent Security
Internet Security
Intellectual Property Protection
E-Commerce Security
E-Government Security
E-Health Security
Home System Security
Sensor Network Security
Ad hoc network security
Biometrics Security and Applications
Secure Hardware and Smartcards
 
 
** Image Engineering, Multimedia Signal Processing and Communication Security **
 
Multimedia Security
Multimedia Forensic
Digital Watermarking and DRM
Communication Security
Biometrics
Information Fusion
Image Registration
Image Mosaic
Image Indexing and Retrieval
Image and Video Coding
Multiscale Geometric Analysis
Motion Detection and Tracing
Feature Extraction
3G Communication
Embedded System Design
 
 
Author Guidelines:
————————–
Submission of paper should be made through the submission link in IAS 2011 official website or the easychair conference system at: https://www.easychair.org/account/signin.cgi?conf=ias11
Please refer to the conference website for guidelines to prepare your manuscript. All accepted papers will be compiled in conference proceedings published by the IEEE. It is mandatory at least an author registers for every paper that is included in the conference proceedings. Proceedings will be made available during the conference.
 
 
 
IAS 2011 Organizing team:
———————————————
 
General Chairs
Ajith Abraham, MIR Labs, Europe
Daniel Zeng, University of Arizona, USA
Dharma Agrawal, University of Cincinatti, USA
 
 
Information Contact:
—————————-
Azah Kamilah Muda, UTeM, Malaysia

Jul 19

IEEE SYSTEMS JOURNAL Special Issue on Security and Privacy in Complex Systems

CALL FOR PAPERS


IEEE SYSTEMS JOURNAL
Special Issue on Security and Privacy in Complex Systems


Today's information society relies on a globally interconnected
infrastructure composed of diverse and widely distributed systems. It
is of utmost importance to ensure proper protection to such complex
systems, or systems-of-systems, to ensure security, privacy, and
availability of the infrastructure as well as of resources and
information it provides and manages. The problem is far from trivial,
due to the criticality and the social impact of the applications and
services relying on this global infrastructure, as well as the
complexity given by the co-existence and co-operation of, possibly
heterogeneous, component systems.
The goal of this special issue is to collect high-quality
contributions on security and privacy in complex systems and
systems-of-systems. We solicit submissions from academia, industry,
and government presenting novel and original research on all
theoretical and practical aspects of security and privacy in complex
systems. The focus of the special issue spans security and privacy
theory, technology, methodology, and applications in complex systems.
Submitted papers should therefore explicitly address issues in the
complex system scenario. Topics of interest include, but are not
limited, to the ones listed below provided that they are treated
with specific focus on the complex system scenario.

– access control
– anonymity
– applied cryptography
– authentication
– biometric security and privacy
– cyber warfare and security
– complex systems security
– computer forensics
– critical infrastructure protection
– data and application security
– data protection
– data/system integrity
– dependability, reliability, and availability
– formal methods for security and privacy
– human factors in security and privacy
– identity management
– insider threats
– intrusion detection and prevention
– knowledge extraction/representation for security
– legal and ethical issues
– middleware security
– network security
– operating systems security and privacy
– protection from cyberhacking
– security engineering
– secure environments and applications
– secure interoperability
– security and privacy metrics
– security and privacy policies
– security and privacy in cloud computing
– security and privacy in ad hoc networks
– security and privacy in e-services
– security and privacy in grid computing
– security and privacy in mobile systems
– security and privacy in monitoring systems
– security and privacy in industrial systems
– security and privacy in pervasive/ubiquitous computing
– security and privacy in sensor networks
– security and privacy in smart grid and distributed generation systems
– security and privacy in social applications and networks
– security and privacy in wireless sensor networks
– security architectures
– security management in complex scenarios
– social implications of security and privacy
– surveillance systems
– threats, vulnerabilities, and risk management
– transportation systems
– trust management
– usable security for complex systems
– verification and validation of complex systems
– web service security


Submitted papers must not be simultaneously submitted to a journal or a
conference with proceedings. Extended versions of prior work should provide
sufficient novel and original technical content; prior publications should
be explicitly referenced in the bibliography, and comparison and added
value with respect to prior publications should be discussed in the text.
All manuscripts for this special issue should be uploaded via the IEEE
Systems Journal Web site (http://www.systemsjournal.org), in the section
dedicated to the special issue, by the deadline of October 1, 2011, and
should follow formatting and submission instructions available at the
Web site. For any questions on the special issue, send email to
pierangela.samarati@unimi.it.


GUEST EDITORS
Sushil Jajodia
George Mason University, USA
jajodia@gmu.edu

Pierangela Samarati
Universita` degli Studi di Milano, Italy
pierangela.samarati@unimi.it


IMPORTANT DATES
Paper submission due: October 1, 2011
First notification to authors: January 15, 2012
Revised paper submission due: March 15, 2012
Second notification to authors: April 30, 2012
Publication date: 2012

Mar 25

Best Ph.D. Thesis on Security and Trust Management

 

ERCIM STM WG 2011 Award for the

Best Ph.D. Thesis on Security and Trust Management

 

The European Research Consortium in Informatics and Mathematics (ERCIM – www.ercim.org) has a technical WG on Security and Trust Management (STM – www.iit.cnr.it/STM-WG) for performing a series of activities, as research projects, workshop/conference organization, dissemination of knowledge, for increasing the European research and development capabilities on security, trust and privacy.

 

One of the main goals of the WG is to promote the scientific growth of young researchers interested in the field of security and trust management. Thus, ERCIM STM WG established an award for the best Ph.D. thesis in this area in order to increase the visibility of the young researchers inside the ERCIM scientific community as well as in the larger European one.

 

The topics of interest include, but are not limited to:

·      rigorous semantics and computational models for security and trust;

·      security and trust management architectures, mechanisms and policies;

·      networked systems security;

·      privacy and anonymity;

·      identity management;

·      ICT for securing digital as well as physical assets;

·      cryptography.

 

Applications for the 2011 Award are open to all Ph.D. holders that defended their thesis during 2010 in any European University. Applications consisting of the Ph.D. Thesis (in PDF format), a short summary of the Thesis (mandatory in English) and at least two letters of support (one from a researcher of an ERCIM STM WG Institution) should be sent by May 8th 2011 to the WG Chair, Javier Lopez <jlm@lcc.uma.es>.

 

Theses will be evaluated by a Committee appointed from the European research community. The theses will be judged on the basis of scientific quality, originality, clarity of presentation, as well as potential impact of the results. The Committee members for the competition are:

 

·      Joris Claessens, Microsoft, Germany

·      Jorge Cuellar, Siemens, Germany

·      Javier Lopez, Univ. of Malaga, Spain

·      Fabio Martinelli, CNR, Italy

·      Vashek Matyas, Masaryk Univ., Czech Republic

·      Bart Preneel, KUL, Belgium

·      Alexander Pretschner, KIT, Germany

·      Ketil Stoelen, SINTEF, Norway

·      Edgar Weippl, SBA, Austria

 

The ceremony for the Award will be held during the 7th International Workshop on Security and Trust Management (STM 2011), 27-28 June 2011, in Copenhagen (Denmark).