Tag: call for papers

Aug 14

ACCESS 2013 : The International Congress on Advances in Citizen, Cyberspace & Environment Safety and Security 2013


ACCESS 2013 : The International Congress on Advances in Citizen, Cyberspace & Environment Safety and Security 2013

Link: http://www.accesscongress.org
When Jun 5, 2013 – Jun 7, 2013
Where Singapore
Submission Deadline Oct 15, 2012
Notification Due Nov 19, 2012
Final Version Due Jan 7, 2013
Categories    research   informatics   environment   security

Call For Papers

The ACCESS Congress 2013 seeks for original research papers in the following areas, but are not limited to the domains listed below. The submission topics are divided into 4 domains:

(A) Human Safety & Security

Healthcare & Wellness
Pandemic Management
Infectious Diseases
Low Fertility
Human Performance

(B) Environment Safety &Security

Energy Sustainability
Food & Water
Climate Change
Building Infrastructures
Disaster Management

(C) Information Safety & Security

Cloud Security
Social Media
Mobile Security
Electronic Crimes
Online Child Pornography

(D) Homeland Safety & Security

Sensors Systems
Microsystem Technologies
Transport & Logistics
Analytics & Intelligence
Immigrants and Social Issues

ACCESS 2013 : The International Congress on Advances in Citizen, Cyberspace & Environment Safety and Security 2013.

Aug 14

Book CFC 2012 : Call for Chapters: Organizational, Legal, and Technological Dimensions of Information System Administration


Book CFC 2012 : Call for Chapters: Organizational, Legal, and Technological Dimensions of Information System Administration

Link: http://www.igi-global.com/publish/call-for-papers/call-details/763
When N/A
Where N/A
Submission Deadline Aug 31, 2012
Notification Due Oct 15, 2012
Final Version Due Nov 30, 2012
Categories    system administration   security   legal issues

Call For Papers

A large quantity of digital information is being created every moment by individual and corporate consumers of IT. This information is increasingly being recognized as a key economic resource and as one of the firm’s most important assets, just as much as capital infrastructure and people. Managing the digital information at the right time and place is essential for the survival of a company.

However, the complexity of information management is huge, particularly in large organizations. The data explosion continues to drive the demand for increased storage capacity and a parallel need to secure that information. Companies are facing increased security threats from both within the organization and externally. A company’s data is one of its most valuable assets an organization needs to implement a thorough security plan, taking all aspects of securing the data into account. Currently, all organizations have a system administrator, which is part of the organization’s policy. The administrator’s role is mainly developed in the dark to avoid data leaks, safeguard the integrity of databases, etc.; but when there is a failure, a breach of competition rules, a violation of confidentiality, the responsibility relies in the administrator.

Objective of the Book
The mission of the book is to discuss the main issues, challenges, opportunities and solutions related to the role and responsibility of the system’s administrator. Therefore, we intend to discuss the mission and challenges of a system’s administration in the 21st century, the importance of proper information security policy, the drivers and barriers to address a completely safe and reliable ICT system, and the organizational and legal implications of system administration. Furthermore, we expect to present some practical solutions that would make it possible to implement a reliable system administration policy.

Target Audience
This book is expected to be a support to disciplines (post-graduate studies) of Management, Enterprise Information Systems, Information Systems Management and Management Information Systems in general. It intends, also, to serve as guidance for top managers and information technologies (IT) professionals (system developers and IT specialists).

Recommended topics include, but are not limited to, the following:
Role and responsibilities of the system’s administrator
Importance of a proper information security policy
Drivers and barriers to address a completely safe and reliable ICT system
Critical success factors for its adoption by SME
Network security policies and best practices
Threats and countermeasures for information system security
Legal and regulatory frameworks
Organizational and legal implications
Compared studies of regulations
Surveys and case studies

Submission Procedure
Researchers and practitioners are invited to submit on or before August 30, 2012, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified by October 15, 2012 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by November 30, 2012. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2013.

Important Dates
August 30, 2012: 1st Proposal Submission Deadline
October 15, 2012: Notification of Acceptance
November 30, 2012:Full Chapter Submission
January 30, 2013: Review Results Returned
March 30, 2013: Final Chapter Submission
May 15, 2013: Final Deadline

Inquiries and submissions can be forwarded electronically (Word document):

Prof. Dr. Fernando Almeida
ISPGaya, School of Technology and Science
Av. dos Descobrimentos, 333 • 4400-103 Santa Marinha – Vila Nova de Gaia
Tel.: +351 223 745 730/1 • Fax: +351 220 134 479
E-mail: portelalmd@gmail.com

Book CFC 2012 : Call for Chapters: Organizational, Legal, and Technological Dimensions of Information System Administration.

Aug 14

UDD 2012 : Special Session on Undesirable Data Detection


UDD 2012 : Special Session on Undesirable Data Detection

Link: http://www.mirlabs.net/ias12/ss1.html
When Nov 21, 2012 – Nov 23, 2012
Where São Carlos, Brazil
Submission Deadline Aug 15, 2012
Notification Due Sep 15, 2012
Final Version Due Sep 30, 2012
Categories    undesirable data detection   security

Call For Papers

Call for Papers of the Special Session on
Undesirable Data Detection — UDD 2012

Under the framework of the 8th International Conference on Information Assurance and Security (IAS 2012), 21-23 November 2012 in São Carlos, Brazil

In recent years, research in the area of ICT security grows rapidly, mainly thanks to growing number of security threats arising internally or externally. Undesirable behavior comprising any intentionally or unintentionally misuse of resources in information systems produces growing quantity of new undesirable data every day. Undesirable Data Detection (http://www.mirlabs.net/ias12/ss1.html) Special Session aims at presenting novel approaches for evaluating or detecting potentially malicious activity threatening the security of ICT.
The special session seeks contributions about foundations of undesirable data detection as well as case studies, empirical, and other methodological works. It will provide an opportunity to disseminate latest results in this important field.
This section is focused on mining or detection of the undesirable data (such as spam emails and other unsolicited message in any communication system) and on its optimization for all possible aspects of security. Moreover, the session focuses on engines for Intrusion Detection Systems detection based on rules and on data elaboration, with special care of solution able to support data parallelization and GPU computing. Last but not least the special session aims at collecting case studies and real application of Undesirable data detection.

Specific topics of interest
The preferred topics for this special session are (but not limited to):
• Detection techniques and Methodologies
o Spam detection
o Intrusion detection
o Similarity detection
o Plagiarism detection
o Dangerous patterns in data streams
o Steganography detection
• Detection Techniques Application
o Scalable IDs architecture
o GPU and parallel Computing for Undesirable Data and Intrusion Detection
• Intrusion and Undesirable Data Detection Case Studies
o Detection in network systems
o Intrusion Detection in Cloud systems
o Industrial and real case studies

Special Session paper submission will be done through IAS 2012 submission system and been evaluated with the same standard as the regular conference paper. All accepted papers will be included in the IAS 2012 conference proceedings.
Papers must be submitted within the stipulated time and electronic submission in PDF is required. A full paper (6 pages, A4 size) for oral presentation should in the IEEE 8.5 two-column format. Papers should contain up to 5 keywords. Papers will be evaluated for originality, significance, clarity, and soundness, and will be reviewed by at least three independent reviewers.

Details are available at the conference website http://www.mirlabs.net/ias12/. Submit your paper at the submission site https://www.easychair.org/account/signin.cgi?conf=ias12.

Program Chair
Vaclav Snášel, Department of Computer Science, VSB – Technical University of Ostrava, vaclav.snasel@vsb.cz

Session Coordinators
Eliška Ochodková, eliska.ochodkova@vsb.cz
Pavel Krömer, pavel.kromer@vsb.cz

Program committee
Vaclav Snasel, VSB-Technical University of Ostrava, Czech Republic, vaclav.snasel@vsb.cz
Milos Kudelka, VSB-Technical University of Ostrava, Czech Republic, milos.kudelka@vsb.cz
Pavel Kromer, VSB-Technical University of Ostrava, Czech Republic, pavel.kromer@vsb.cz
Jan Platos, VSB-Technical University of Ostrava, Czech Republic, jan.platos@vsb.cz
Pavel Moravec, VSB-Technical University of Ostrava, Czech Republic, pavel.moravec@vsb.cz
Petr Gajdos, VSB-Technical University of Ostrava, Czech Republic, petr.gajdos@vsb.cz
Jan Martinovic, VSB-Technical University of Ostrava, Czech Republic, jan.martinovic@vsb.cz
Petr Musilek, University of Alberta, Canada, musilek@ece.ualberta.ca
Suhail S. Owais, AL-Balaqa University, Jordan, suhailowais@yahoo.com
Hideyasu Sasaki, University of Hong Kong, Hong Kong, hsasaki@uchicago.edu
Juan D. Velasquez, University of Chile, Santiago, Chile, juansensei@gmail.com
Miroslav Voznak, VSB-Technical University of Ostrava, Czech Republic, miroslav.voznak@vsb.cz

UDD 2012 : Special Session on Undesirable Data Detection.

Aug 14

WiSec 2013 : The Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks


WiSec 2013 : The Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks

Link: http://www.crysys.hu/recent-news/229-wisec-2013.html
When Apr 17, 2013 – Apr 19, 2013
Where Budapest, Hungary
Submission Deadline Oct 29, 2012
Notification Due Jan 20, 2013
Final Version Due Feb 15, 2013
Categories    wireless   security   communications   networks

Call For Papers

* ACM approval pending



Submission Deadline: Oct 29
Notification Date: Jan 20
Camera-Ready Deadline: Feb 15


WiSec has been broadening its scope and seeks to present high quality
research papers exploring security and privacy aspects of wireless
communications, mobile networks, and their applications. Beyond the
traditional Wisec staples of physical, link, and network layer security, we
also welcome papers focusing on the security and privacy of mobile software
platforms and the increasingly diverse range of mobile or wireless
applications. The conference welcomes both theoretical as well as systems

Topics of interest include, but are not limited to:
* Mobile malware and platform security
* Security & Privacy for Smart Devices (e.g., Smartphones)
* Wireless and mobile privacy and anonymity
* Secure localization and location privacy
* Cellular network fraud and security
* Jamming attacks and defenses
* Key extraction, agreement, or distribution in wireless and mobile
* Theoretical foundations, cryptographic primitives, and formal
methods for wireless security and privacy
* NFC and smart payment applications
* Security and privacy for mobile sensing systems
* Wireless or mobile security and privacy in health, automotive,
avionics, or smart grid applications

The proceedings of ACM WiSec will be published by the ACM (pending

FULL AND SHORT PAPERS: Full paper submissions to WiSec 2013 can be up to 10
pages in the ACM conference style excluding the bibliography and well marked
appendices, and up to 12 pages in total. WiSec also encourages the
submission of short papers with a length of up to 6 pages, which describe
mature work of a more succinct nature. All papers must be thoroughly
anonymized for double-blind reviewing. Detailed submission instructions
will appear on the conference website

DOUBLE SUBMISSIONS: It is a policy of the ACM
(http://www.acm.org/publications/policies/RightsResponsibilities) to
disallow double submissions, where the same (or substantially similar)
paper is concurrently submitted to multiple conferences/journals. Any
double submissions detected will be immediately rejected from all
conferences/journals involved.


General Chair
Levente Buttyan, Budapest University of Technology and Economics, Hungary

Technical Program Chairs
Ahmad-Reza Sadeghi, Technische Universität Darmstadt, Germany
Marco Gruteser, Rutgers University, USA

Steering committee
N. Asokan, NRC, Finland
Levente Buttyan, BME, Hungary
Claude Castelluccia, INRIA, France
Jean-Pierre Hubaux, EPFL, Switzerland
Douglas Maughan, DHS, USA
Adrian Perrig, CMU, USA
Gene Tsudik, UCI, USA (chair)
Dirk Westhoff, HAW, Germany

WiSec 2013 : The Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks.

Aug 14

ELS 2012 : The 7th Workshop on E-Learning Security


ELS 2012 : The 7th Workshop on E-Learning Security

Link: http://www.icitst.org/ELS-2012.pdf
When Dec 10, 2012 – Dec 12, 2012
Where London, UK
Submission Deadline Oct 1, 2012
Categories    e-learning    security

Call For Papers

The 7th Workshop on E-Learning Security (ELS-2012)
In Conjunction With
The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012)
Technical Co-Sponsored by IEEE UK/RI Computer Chapter
December 10-12, 2012
London, UK

Important Dates:
Submission Date: October 1, 2012
Notification Date: October 10, 2012
Camera Ready: October 30, 2012
Conference Dates: December 10-12, 2012

Topics of interest include but are not limited to:
*Security and Privacy in E-Learning
*Security Issues on E-Learning Assessments
*E-Learning Security Auditing
*Biometrics in E-Learning
*Secure E-Learning Development and Application
*Digital Rights Management (DRM) for E-Learning
*Emerging E-Learning Markets
*Collaborative Research
*Ongoing research from undergraduates, graduates/postgraduates and professionals
*Future Technologies

Paper submission:
Length of paper:
* Full-paper: 6 pages
* Extended Abstract: 2 pages
The style file and templates are available at Paper Submission.
Please submit your full paper(s) in PDF format via email to: els-2012@icitst.org

For further details, please visit http://www.icitst.org/ELS-2012.pdf

ELS 2012 : The 7th Workshop on E-Learning Security.

Aug 14

ASIACCS 2013 : 8th ACM Symposium on Information, Compuer and Communications Security


ASIACCS 2013 : 8th ACM Symposium on Information, Compuer and Communications Security

Link: http://hise.hznu.edu.cn/asiaccs/
When May 8, 2013 – May 10, 2013
Where Hangzhou, China
Submission Deadline Nov 30, 2012
Categories    security

Call For Papers

Building on the success of ACM Conference on Computer and Communications Security (CCS) and ACM Transactions on Information and System Security (TISSEC), the ACM Special Interest Group on Security, Audit, and Control (SIGSAC) formally established the annual ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS). The inaugural ASIACCS was held in Taipei (2006). Since then the ASIACCS have been held in Singapore (2007), Tokyo (2008), Sydney (2009), Beijing (2010), Hong Kong (2011), and Seoul (2012). ASIACCS 2013 is the eighth conference of the series.

ASIACCS is a major international forum for information security researchers, practitioners, developers, and users to explore and exchange the newest cyber security ideas, breakthroughs, findings, techniques, tools, and experiences. We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of computer and network security. Areas of interest for ASIACCS 2012 include, but are not limited to:

access control

identity management

privacy-enhancing technology

accounting and audit

Inference control and disclosure

security in ubiquitous computing

applied cryptography

information warfare

security management


intellectual-property protection


cloud computing security

intrusion detection

software security

data/system integrity

key management

trusted computing

data and application security

malware and botnets

wireless security

digital-rights management

mobile-computing security

web security

formal methods for security

operating system security

hardware-based security

phishing and countermeasures

Important Dates

Submission Deadline: 30 November 2012, 23:59 UTC (Firm Deadline)
Acceptance Notification: 29 January 2013
Camera-ready Copy Due: 18 February 2013
Conference: 8-10 May 2013

Instructions for authors Submissions must be written in English, and must be at most 10 pages in 10pt, double-column format excluding the bibliography and well-marked appendices, and at most 12 pages overall. Committee members are not required to read appendices, so the paper should be intelligible without them. Submissions must be in ACM SIGPLAN format (http://www.sigplan.org/authorInformation.htm) with page numbers (so, LaTeX users should specify documentclass[10pt,preprint]{sigplanconf}). No changes to margins, spacing, or font sizes (or anything else) are allowed from those specified by the style file. We reserve the right to request the source files for a submission to verify compliance with this requirement. Only PDF files will be accepted.

All submissions must be anonymized. An author’s name should occur only in references to that author’s related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the conference.

Accepted papers will be published by ACM Press in conference proceedings and in the ACM Digital Library. Final proceedings versions will be 10 pages in double-column ACM format, although authors will have the option of buying a limited number of additional pages. In addition to regular papers, some short papers could also be accepted and included in the proceedings.

ASIACCS 2013 : 8th ACM Symposium on Information, Compuer and Communications Security.

Aug 09

3rd International Conference on Cloud Computing and Services Science


3rd International Conference on Cloud Computing and Services Science
CLOSER website: http://closer.scitevents.org

May 8 – 10, 2013
Aachen, Germany

Co-organized by: RWTH
Sponsored by: INSTICC
INSTICC is Member of: WfMC and OMG
Technically sponsored by: SINTEF

Regular Paper Submission: November 15, 2012
Authors Notification (regular papers): January 17, 2013
Final Regular Paper Submission and Registration: February 7, 2013

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

We would like to draw your attention to the 3rd International Conference on Cloud Computing and Services Science (CLOSER 2013 – http://closer.scitevents.org) whose submission deadline is scheduled for November 15, 2012. We hope you can participate in this conference by submitting a paper reflecting your current research in any of the following areas:

– Cloud Computing Fundamentals
– Services Science Foundation for Cloud Computing
– Cloud Computing Platforms and Applications
– Cloud Computing Enabling Technology

The conference will be sponsored by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), co-organized by the Aachen University (RWTH) and technically sponsored by SINTEF. INSTICC is Member of the Workflow Management Coalition (WfMC) and Object Management Group (OMG).

The 3rd International Conference on Cloud Computing and Services Science, CLOSER 2013, focuses on the emerging area of Cloud Computing, inspired by some latest advances that concern the infrastructure, operations, and available services through the global network. Further, the conference considers as essential the link to Services Science, acknowledging the service-orientation in most current IT-driven collaborations. The conference is nevertheless not about the union of these two (already broad) fields, but about Cloud Computing where we are also interested in how Services Science can provide theory, methods and techniques to design, analyze, manage, market etc.

We would like to highlight the presence of the following keynote speakers:
– Gottfried Vossen, WWU Münster, Germany
– Ivona Brandic, Vienna UT, Austria

CLOSER is interested in promoting high quality research as it can be confirmed by last year acceptance rates, where from 145 submissions, 19% were accepted as full papers. Additionally, 30% were presented as short papers and 14% as posters.

Submitted papers will be subject to a double-blind review process. All accepted papers (full, short and posters) will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support. EHHC
A short list of presented papers will be selected for publication of extended and revised versions in a Special Issue of the Journal of Future Generation Computer Systems. Also a short list of presented papers will be selected so that revised and extended versions of these papers will be published by Springer-Verlag in a SSRI Series book.

The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP and EI (Elsevier Index).
All papers presented at the conference venue will be available at the SciTePress Digital Library (http://www.scitepress.org/DigitalLibrary/). SciTePress is member of CrossRef (http://www.crossref.org/).

Best paper awards will be distributed during the conference closing session. Please check the website for further information (http://closer.scitevents.org/BestPaperAward.aspx).

We also would like to highlight the possibility to submit to the following Special Session, whose deadline is scheduled for March 1, 2013:
– Special Session on Security Governance and SLAs in Cloud Computing (CloudSecGov)

Workshops, Special sessions, Tutorials as well as Demonstrations dedicated to other technical/scientific topics are also envisaged: companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat. Workshop chairs and Special Session chairs will benefit from logistics support and other types of support, including secretariat and financial support, to facilitate the development of a valid idea.

CLOSER 2013 will be held in conjunction with WEBIST 2013 (International Conference on Web Information Systems and Technologies – www.webist.org/), CSEDU 2013 (International Conference on Computer Supported Education – http://www.csedu.org/) and SMARTGREENS 2013 (International Conference on Smart Grids and Green IT Systems – http://www.smartgreens.org/) in Aachen, Germany. Registration to CLOSER will enable free attendance to any sessions of WEBIST, CSEDU and SMARTGREENS conferences as a non-speaker.

Please check further details at the CLOSER conference website (http://closer.scitevents.org).
Should you have any question please don’t hesitate contacting me.

Kind regards,
Joao Teixeira
CLOSER Secretariat

Av. D. Manuel I, 27A 2.Esq.
2910-595 Setubal, Portugal
Tel.: +351 265 520 184
Fax: +44 203 014 8638
Email: closer.secretariat@scitevents.org

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Matthias Jarke, RWTH Aachen, Germany

Frederic Desprez, LIP / INRIA, France
Donald Ferguson, Dell, United States
Ethan Hadar, CA Technologies, Israel
Frank Leymann, University of Stuttgart, Germany

Please check the program committee members at http://closer.scitevents.org/ProgramCommittee.aspx


Area 1: Cloud Computing Fundamentals

– Cloud Computing Architecture
– Cloud Standards
– Cloud Application Portability
– Cloud Interoperability
– Cloud Delivery Models
– Cloud Deployment Models: Public/Private/Hybrid Cloud
– Cloud Risk, Challenges, and Governance
– Business Cloud vs. Software Cloud

Area 2: Services Science Foundation for Cloud Computing

– Semantic Web Technologies
– Web Services
– Service and Systems Design and QoS Network Security
– Service-Oriented Architecture
– Internet of Services
– Service Modeling and Specification
– Service Composition
– Service Discovery
– Service Monitoring and Control
– Business Services Realized by IT Services
– Service Innovation
– Service Operation
– Service Strategy
– Service Marketing and Management
– Information and Service Economy
– Human Beings in Service Systems
– Enterprise Architectures and Services

Area 3: Cloud Computing Platforms and Applications

– Vertical Specific Cloud Services
– Mobility
– Cloud Middleware Frameworks
– Cloud Application Architectures
– Cloud Application Scalability and Availability
– XaaS
– ITaaS
– COTS and Cloud
– Cloudsourcing
– Cloud Applications Performance and Monitoring
– Development Methods for Cloud Applications
– Economics (ROI, Costs, CAPEX/OPEX,.)
– Outsourced Production Environments
– Collective Intelligence/Crowd Computing
– Context-aware Computing and Peer to Peer Computing
– Big Data Cloud Services

Area 4: Cloud Computing Enabling Technology

– Troubleshooting and Best Practices
– Monitoring of Services, Quality of Service, Service Level Agreements
– Security and Cyber Security in the Cloud
– Performance Development and Management
– Cloud Ilities (Scalability, Availability,Reliability)
– Dynamic Capacity and Performance Management
– Cloud Optimization and Automation
– Virtualization Technologies
– Disaster Recovery
– Cloud Abstraction of Composite IT Systems
– Cloud IT Systems Reuse


Aug 09

Eleventh Smart Card Research and Advanced Application Conference – Cardis 2012

CARDIS 2012 – Call for Papers
Eleventh Smart Card Research and Advanced Application Conference

Since 1994, CARDIS is the foremost international conference dedicated
to smart card research and applications. Smart cards and secure
elements are the basis for many secure systems and play a decisive
role in ID management. Established computer science areas like
hardware design, operating systems, system modeling, cryptography,
verification and networking got adapted to this fast growing
technology and investigate emerging issues resulting from it. Unlike
events devoted to commercial and application aspects of smart cards,
CARDIS conferences gather researchers and technologists who focus on
all aspects of the design, development, deployment, validation and
application of smart cards and secure elements in secure platforms or

The eleventh Smart Card Research and Advanced Application IFIP
Conference, organized by the Institute for Applied Information
Processing and Communications (IAIK), Graz University of Technology,
will be held in the Weitzer Hotel, Graz, Austria.
The program committee is seeking original papers on all aspects of
smart cards and secure elements. Submissions across a broad range of
the development phases are encouraged, from exploratory research and
proof-of-concept studies to practical applications and deployment of
smart cards and related technologies. Topics of interest include, but
are not limited to:
– Software for secure embedded systems (operating systems, virtual
machines, … )
– Hardware architectures for secure embedded systems
– Security of RFID systems and sensor nodes
– Security of mobile devices and applications
– Efficient and secure implementations of cryptographic algorithms
– Cryptographic protocols for embedded systems
– Physical attacks and countermeasures
– Secure applications for embedded systems
– Embedded systems networking
– Person representation in embedded systems
– Formal modeling and formal proofs
– Validation and certification of embedded systems and applications
– Identity, privacy and trust issues

Authors are invited to submit papers (PDF or PS format) with novel
contributions electronically using the submission form available on
the following web site:
Submitted papers must be original, unpublished, anonymous and not
submitted to journals or other conferences/workshops that have
proceedings. Submissions must be written in English and should be at
most 15 pages in total. Papers not meeting these guidelines risk
rejection without consideration. All submissions will be

Submission implies the willingness of at least one of the authors to
register and present the paper. The proceedings will be published in
the Springer Lecture Notes in Computer Science (LNCS) series. Accepted
papers should follow the LNCS default author instructions at

Important dates

Submission of papers: August 20th, 2012, 23:59 GMT+02
Notification of acceptance: October 15, 2012
Camera-ready version of papers for pre-proceedings: November 7, 2012
Workshop date: November 28–30, 2012
Final version of papers: December 17, 2012

Program Committee
N. Asokan,  Nokia Research Center, Finland
Gildas Avoine,  UCL, Belgium
Chetali Boutheina,  Trusted Labs, France
Josep Domingo Ferrer,  Rovari i Virgili University, Catalonia
Hermann Drexler,  Giesecke & Devrient, Germany
Martin Feldhofer,  NXP, Austria
Berndt Gammel,  Infineon, Germany
Tim Güneysu,  Ruhr-University Bochum, Germany
Helena Handschuh,  Cryptography Research Inc., USA and KU Leuven, Belgium
Michael Hutter,  TU Graz, Austria
Marc Joye,  Technicolor, France
Ioannis Krontiris,  Göthe Universität Frankfurt, Germany
Jean-Louis Lanet,  University of Limoges, France
Konstantinos Markantonakis,  Royal Holloway, UK
Andrew Martin,  University of Oxford, UK
David Naccache,  ENS, France
Elisabeth Oswald,  University of Bristol, UK
Catuscia Palamidessi,  INRIA, France
Eric Peeters,  Texas Instruments, USA
Erik Poll,  RU Nijmegen, Netherlands
Bart Preneel,  KU Leuven, Belgium
Emmanuel Prouff,  ANSSI, France
Matthieu Rivain,  CryptoExperts, France
Pankaj Rohatgi,  Cryptography Research, USA
Ahmad-Reza Sadeghi,  TU Darmstadt, Germany
Jean-Pierre Seifert,  TU Berlin, Germany
Sergei Skorobogatov,  Cambridge University, UK
François-Xavier Standaert,  UCL, Belgium
Frederic Stumpf,  Fraunhofer AISEC, Germany
Marc Witteman,  Riscure, Netherlands

Organizational Committee
Stefan Mangard
(Program Chair)
Infineon Technologies, Germany
Email: Stefan.Mangard AT infineon.com

Jörn-Marc Schmidt
(General Chair)
Graz University of Technology, Austria
Email: joern-marc.schmidt AT iaik.tugraz.at

Jean-Jacques Quisquater
(Publicity Chair)
Université catholique de Louvain, Belgium
Email: jjq AT uclouvain.be

Jul 04

International Symposium on Engineering Secure Software and Systems (ESSoS)

Call For Papers

International Symposium on Engineering Secure Software and Systems (ESSoS)


February 27 – March 1, 2013, Paris, France

In cooperation with (pending): ACM SIGSAC and SIGSOFT and IEEE CS (TCSE).


Trustworthy, secure software is a core ingredient of the modern world.
Hostile, networked environments, like the Internet, can allow
vulnerabilities in software to be exploited from anywhere.  To address this,
high-quality security building blocks (e.g., cryptographic components) are
necessary, but insufficient. Indeed, the construction of secure software is
challenging because of the complexity of modern applications, the growing
sophistication of security requirements, the multitude of available software
technologies and the progress of attack vectors.
Clearly, a strong need exists for engineering techniques that scale well and
that demonstrably improve the software’s security properties.


The goal of this symposium, which will be the fifth in the series, is to
bring together researchers and practitioners to advance the states of the
art and practice in secure software engineering. Being one of the few
conference-level events dedicated to this topic, it explicitly aims to
bridge the software engineering and security engineering communities, and
promote cross-fertilization. The symposium will feature two days of
technical program, and is also open to proposals for both tutorials and
workshops. In addition to academic papers, the symposium encourages
submission of high-quality, informative experience papers about successes
and failures in security software engineering and the lessons learned.
Furthermore, the symposium also accepts short idea papers that crisply
describe a promising direction, approach, or insight.


The Symposium seeks submissions on subjects related to its goals. This
includes a diversity of topics including (but not limited to):

– scalable techniques for threat modeling and analysis of vulnerabilities
– specification and management of security requirements and policies
– security architecture and design for software and systems
– model checking for security
– specification formalisms for security artifacts
– verification techniques for security properties
– systematic support for security best practices
– security testing
– security assurance cases
– programming paradigms, models and DLS’s for security
– program rewriting techniques
– processes for the development of secure software and systems
– security-oriented software reconfiguration and evolution
– security measurement
– automated development
– trade-off between security and other non-functional requirements (in
economic considerations)
– support for assurance, certification and accreditation
– empirical secure software engineering


The proceedings of the symposium are published by Springer-Verlag (pending)
in the Lecture Notes in Computer Science Series
Submissions should follow the formatting instructions of Springer LNCS.
Submitted papers must present original, non-published work of high quality.

For selected papers, there will be an invitation to submit extended versions
to a special issue in the International Journal of Information Security.

Two types of papers will be accepted:

Full papers (max 14 pages without bibliography/appendices) – May describe
original technical research with a solid foundation, such as formal analysis
or experimental results, with acceptance determined mostly based on novelty
and validation. Or, may describe case studies applying existing techniques
or analysis methods in industrial settings, with acceptance determined
mostly by the general applicability of techniques and the completeness of
the technical presentation details.

Idea papers (max 8 pages with bibliography) – May crisply describe a novel
idea that is both feasible and interesting, where the idea may range from a
variant of an existing technique all the way to a vision for the future of
security technology.
Idea papers allow authors to introduce ideas to the field and get feedback,
while allowing for later publication of complete, fully-developed results.
Submissions will be judged primarily on novelty, excitement, and exposition,
but feasibility is required, and acceptance will be unlikely without some
basic, principled validation (e.g., extrapolation from limited experiments
or simple formal analysis). In the proceedings, idea papers will clearly
identified by means of the “Idea” tag in the title.

Proposals for both tutorials and workshops are welcome. Further guidelines
will appear on the website of the symposium.


Paper submission:             September 30, 2012
Author notification:           November 22, 2012
Camera-ready:                  December 13, 2012


PC Co-Chairs

Jan Jürjens, TU Dortmund and Fraunhofer ISST
Ben Livshits, Microsoft Research

Davide Balzarotti, EURECOM, France
Ruth Breu, University of Innsbruck, Austria
Cristian Cadar, Imperial College, UK
Julian Dolby, IBM Research, US
Matt Fredrikson, University of Wisconsin, US
Dieter Gollmann, TU Hamburg-Harburg, Germany
Maritta Heisel, U. Duisburg Essen, Germany
Peter Herrmann, NTNU, Trondheim, Norway
Thorsten Holz, U. Ruhr Bochum, Germany
Sergio Maffeis, Imperial College, UK
Heiko Mantel, TU Darmstadt, Germany
Anders Møller, Aarhus University, Denmark
Haris Mouratidis, University of East London, UK
Zachary Peterson, Naval Postgraduate School, US
Frank Piessens, KU Leuven, Belgium
Erik Poll, RU Nijmegen, NL
Alexander Pretschner, TU Munich, Germany
Wolfgang Reif, University of Augsburg, Germany
Jianying Zhou, Institute for Infocomm Research, Singapore
Mohammad Zulkernine, Queens University, Canada

Jul 02

CANS 2012 – The 11th International Conference on Cryptology and Network Security

CANS 2012 – The 11th International Conference on Cryptology and Network Security
Darmstadt, Germany, December 12-14, 2012


The International Conference on Cryptology and Network Security (CANS) is a
recognized annual conference, focusing on all aspects of cryptology and
network security, attracting cutting-edge results from world-renowned
scientists in the area.

Original research papers on all technical aspects of cryptology and network
security are solicited for submission to CANS 2012. Papers suggesting novel
paradigms, original directions, or non-traditional perspectives are
especially welcome.

Topics of Interest

– Access Control
– Anonymity
– Authentication, Identification
– Biometrics
– Block and Stream Ciphers
– Cloud Security
– Cryptographic Algorithms, Protocols
– Denial of Service
– Embedded Platform Security
– Hash Functions
– (Future) Internet Security
– Key Management
– Network Security
– Peer-to-Peer Security
– Identity and Trust Management
– Public-key Cryptography
– Secure Hardware
– Security Modeling and Architectures
– Spyware Analysis and Detection
– Wireless and Mobile Security

Important Dates
Submission deadline: July 15, 2012, 11:00 UTC
Notification of acceptance: September 8, 2012
Camera-ready deadline: September 15, 2012
Conference:  December 12-14, 2012


General chair:
– Mark Manulis, University of Surrey, UK

Program chairs:
– Josef Pieprzyk, Macquarie University, Australia
– Ahmad-Reza Sadeghi, Technische Universität Darmstadt / Fraunhofer SIT,

Program committee:
– Michel Abdalla, ENS, France
– Gildas Avoine, Université catholique de Louvain, Belgium
– Feng Bao, Institute for Infocomm Research, Singapore
– Sébastien Canard, Orange Labs, France
– Sherman Chow, University of Waterloo, Canada
– Nicolas Courtois, University College London, UK
– Emiliano De Cristofaro, PARC Research, USA
– Reza Curtmola, New Jersey Institute of Technology, USA
– George Danezis, Microsoft Research Cambridge, United Kingdom
– Roberto Di Pietro, Università di Roma Tre, Italy
– Juan Garay, AT&T Labs Research, USA
– Philip Hawkes, Qualcomm, Australia
– Amir Herzberg, Bar-Ilan University, Israel
– Nick Hopper, University of Minnesota, USA
– Stanislaw Jarecki, University of California, Irvine, USA
– Xuxian Jiang, North Carolina State University, USA
– Seny Kamara, Microsoft Research, USA
– Angelos Keromytis, Columbia University, USA
– Svein Johan Knapskog, NTNU – Trondheim, Norway
– Benoit Libert, Université Catholique de Louvain, Belgium
– Atsuko Miyaji, JAIST, Japan
– Refik Molva, Eurecom, France
– Fabian Monrose, University of North Carolina, USA
– David Naccache, Ecole Normale Supérieure, France
– Michael Nährig, Eindhoven University of Technology, Netherlands
– Eiji Okamoto, University of Tsubuka, Japan
– Claudio Orlandi, Bar-Ilan University, Israel
– Jacques Patarin, Universite de Versailles, France
– Raphael C.-W. Phan, Loughborough University, UK
– Bart Preneel, Katholieke Universiteit Leuven, Belgium
– Vincent Rijmen, TU Graz, Austria
– Matt Robshaw, Orange Labs, France
– Rei Safavi-Naini, University of Calgary, Canada
– Thomas Schneider, TU Darmstadt, Germany
– Elaine Shi (Rungting), UC Berkeley, USA
– Francois-Xavier Standaert, University catholique de Louvain, Belgium
– Douglas Stebila, Queensland University of Technology, Australia
– Ron Steinfeld, Macquarie University, Australia
– Willy Susilo, University of Wollongong, Australia
– Markus Ullmann, Federal Office for Information Security (BSI), Germany
– Ersin Uzun, PARC Research, USA
– Frederik Vercauteren, Katholieke Universiteit Leuven, Belgium
– Huaxiong Wang, Nanyang Technological University, Singapore
– Michael J. Wiener, Irdeto, Canada
– Xinwen Zhang, Huawei Research Center, USA

Local arrangements committee:
– Stanislav Bulygin, Technische Universität Darmstadt, Germany

Steering committee:
– Yvo Desmedt (Chair), University College London, UK
– Matt Franklin, University of California, Davis, USA
– Juan A. Garay, AT&T Labs – Research, USA
– Yi Mu, University of Wollongong, Australia
– David Pointcheval, CNRS and ENS Paris, France
– Huaxiong Wang, Nanyang Technological University, Singapore