Tag: cfp

Apr 18

CALL FOR PAPERS | eDemocracy

CALL FOR PAPERS | eDemocracy.

 

e-Democracy 2015: Citizen rights in the world of the new computing paradigms 
6th International Conference on 
e-Democracy
CALL FOR PAPERS 
December 10-11, 2015, Athens, Greece
www.edemocracy2015.eu

Information and communication technologies move fast; faster than society, faster than governments, faster than the law. Connectivity is already impressive, but the near future brings about the interconnection of everything, via the Internet of Things. It also brings fundamental changes to our computing paradigm, with cloud computing gaining momentum and being expected to become the prevalent computing paradigm in the years to come. Increasingly more data are being collected, about almost everything one can imagine; and they remain there, in cyberspace, for ever, sometimes even resisting efforts to delete them. These data are so attractive that a new science, going by the name “big data” has already emerged. All these developments constitute in most cases an improvement in our everyday lives, but sometimes infringe our rights as citizens. The challenge, therefore, is to safeguard citizen rights in the face of a new era, landmarked by new computing paradigms.
This is the theme of the 6th occasion of the International Conference on e-Democracy that will be held in Athens, the cradle of democracy, on 10-11 December 2015. The conference is organized by the Scientific Council for the Information Society, in co-operation with the Hellenic Data Protection Authority and a substantial number of European and Greek universities and academia. It is intended, similarly to previous occasions, to provide a forum for presenting and debating the latest developments in the field, from a technical, political, and legal point of view.
The conference will include keynote addresses, tutorials, panels, Ph.D. colloquia and sessions, workshops, special, regular and poster sessions. All papers will be peer reviewed. Acceptance will be based on quality, relevance, and originality. Accepted papers will be published in the conference proceedings and selected papers will be invited to participate (after the necessary enhancements) to the evaluation process for inclusion in special issues of peer-reviewed journals.
The working language of the 6th International Conference on “e-Democracy ‘15: Challenges for Citizen Rights in the World of the New Computing Paradigms” is English. It is possible, however, that papers on Greek Law cases of e-Democracy issues be presented in Greek.
Topics of interest
The topics of interest include, but are not limited to, the following:

  • e-Democracy and e-Participation
      o e-Campaigning, e-Politics
      o e-Voting
      o Information and Consultation Platforms
      o Collaborative working environments for e-Democracy
      o Social computing and e-Democracy

• e-Government

    o Open and Big Data for e-Government
    o Cloud computing for e-Government
    o m-Government
    o e-Government services and administrative burdens
    o Business process modeling for e-Government systems
    o Tools and models for e-Government development
    o Case studies and European projects

• Security, Privacy and Trust

    o Security, Privacy and Trust in e-Business services
    o Security, Privacy and Trust in e-Government services
    o Security, Privacy and Trust in Online Social Network Services
    o Cloud Computing Security and Privacy
    o Identity Management, Identity Theft and Trust Management
    o Information Audit and Trust
    o Digital Rights Management
    o Trust and Reputation in Digital Environments
    o Cyber attacks and advances on network security
    o Cryptographic Technologies
    o Anonymisation Methodologies and Best Practices
    o Privacy by Design and Default Methodologies
    o Tracking Technologies and Do-Not-Track Systems
    o Privacy Impact Assessment Methodologies
    o Privacy Enhancing Location and Mobility Management
    o Security and Privacy Audit, Risk and Governance
    o Security and Data Protection Education
    o Tradeoffs between security and efficiency, usability, reliability and cost

• e-Crime, e-Fraud and Digital Forensics

    o Cyber Crime Detection and Prevention
    o Internet Fraud, Cyber War
    o Computer Forensics and Anti-forensics

• Social, legal and ethical issues

    o Digital Divide
    o Internet Addiction
    o Transparency and Accountability in Data Protection
    o Ethics in Digital Societies
    o Surveillance Technologies and Legal Implications
    o Freedom of Expression and Privacy
    o Freedom of Information and Privacy
    o Social factors of collaborative creativity

Important Dates
Full paper submission deadline: May 31, 2015
Notification of decision: July 15, 2015
Camera-ready deadline: July 30, 2015

Instructions for Authors
Submitted papers must not substantially overlap with papers that have been published or that have been simultaneously submitted to a journal or a conference with proceedings. All submissions should be appropriately anonymised (i.e., papers should not contain author names or affiliations, or obvious citations). Submissions should be at most 15 pages, including the bibliography and well-marked appendices, and should follow the LNCS style (http://www.springeronline.com/lncs). Submissions are to be made to the submission web site at https://easychair.org/conferences/?conf=edemocracy15. Only pdf files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Papers must be received by the deadline of 31 May 2015 (11:59 p.m. American Samoa time). Authors of accepted papers must guarantee that their papers will be presented at the conference. Efforts will be made to publish the conference proceedings by Springer in the Lecture Notes in Computer Science (LNCS) series.

The authors of selected accepted papers will be invited to extend their work for further publication in the Emerald journal Information and Computer Security (http://www.emeraldinsight.com/journal/ics# ).

Conference Steering Committee
Sokratis K. Katsikas, University of Piraeus, Greece (Chair)
Vassilis Zorkadis, Vice-President of SCIS, Greece (Vice-chair)
Philippos Mitletton, Secretary General of SCIS, Greece (Secretary)
Lazaros Iliadis, Democritus University of Thrace, Greece
Constantina Costopoulou, Agricultural University of Athens, Greece
Constantine Yialouris, Agricultural University of Athens, Greece
Elias Pimenidis, University of the West of England, UK
Spyros Voulgaris, Vrije Universiteit, The Netherlands
Irene Vassilaki, Board member of SCIS, Greece
Charalampos Patrikakis, Technological Educational Institute of Piraeus, Greece

Conference Honorary Chair
Alexander B. Sideridis, Agricultural University of Athens, Greece

Program Committee Chair
Sokratis K. Katsikas, University of Piraeus, Greece

Program Committee
Isaac Agudo, University of Malaga, Spain
Evgenia Alexandropoulou, University of Macedonia, Greece
Zacharoula Andreopoulou, Aristotle University of Thessaloniki, Greece
Maria Bottis, Ionian University, Greece
Christos Bouras, University of Patras, Greece
Athena Bourka, ENISA, Greece
David Chadwick, University of Kent, UK
Vassilios Chryssikopoulos, Ionian University, Greece
Nathan Clarke,University of Plymouth, UK
Tina Costopoulou, Agricultural University of Athens, Greece
Ernesto Damiani, University of Milan, Italy
Sabrina De Capitani Di Vimercati, University of Milan, Italy
Christos Douligeris, University of Piraeus, Greece
Carmen Fernández-Gago, University of Malaga, Spain
Simone Fischer-Hübner, Karlstad University, Sweden
Sara Foresti,University of Milan, Italy
Steven Furnell, University of Plymouth, UK
Jürgen Fuß,University of Applied Sciences Upper Austria,Austria
Dimitris Geneiatakis, EC Joint Research Center Ispra, Italy
Christos Georgiadis, University of Macedonia, Greece
Dimitris Gouscos, University of Athens, Greece
Stefanos Gritzalis, University of the Aegean, Greece
Mp.Gupta,Indian Institute of Technology Delhi (IIT Delhi), India
Marit Hansen,Unabhängiges Landeszentrum für Datenschutz Schleswig-Holstein, Germany
Lazaros Iliadis, Democritus University of Thrace, Greece
Dimitra Kaklamani, National Technical University of Athens, Greece
Christos Kalloniatis, University of the Aegean, Greece
Ioanna Kantzavelou, Technological Educational Institute of Athens, Greece
Maria Karyda, University of the Aegean, Greece
Vasilis Katos, Bournemouth University, UK
Spyros Kokolakis, University of the Aegean, Greece
Nicholas Kolokotronis, University of Peloponnese, Greece
Panayiotis Kotzanikolaou, University of Piraeus, Greece
Costas Lambrinoudakis, University of Piraeus, Greece
Maria Lambrou, University of the Aegean, Greece
Konstantinos Limniotis, University of Athens, Greece
Antonio Lioy, Politecnico di Torino, Italy
Javier Lopez, University of Malaga, Spain
Nikos Lorentzos, Agricultural University of Athens, Greece
Euripidis Loukis, University of the Aegean, Greece
Emmanouil Magkos, Ionian University, Greece
Vicky Manthou, University of Macedonia, Greece
Nikolaos Marianos, University of the Aegean, Greece
Giannis Marias, Athens University of Economics and Business, Greece
Olivier Markowitch, Université Libre de Bruxelles (ULB), Belgium
Vashek Matyas, Masaryk University, Czech Republic
Vojtech Merunka, Czech Technical University in Prague, Czech Republic
Lilian Mitrou, University of the Aegean, Greece
Martin Molhanec, Czech Technical University in Prague, Czech Republic
Haris Mouratidis, University of Brighton, UK
Maria Ntaliani, Agricultural University of Athens, Greece
Christoforos Ntantogian, University of Piraeus, Greece
Martin Olivier, University of Pretoria, South Africa
Rolf Oppliger, eSECURITY Technologies, Switzerland
Andreas Pashalidis, K.U.Leuven, Belgium
Charalampos Patrikakis, National Technical University of Athens, Greece
Guenther Pernul, University of Regensburg,Germany
Elias Pimenidis, University of the West of England, UK
Nineta Polemi, University of Piraeus, Greece
Bart Preneel, K.U. Leuven, Belgium
Andreja Pucihar, University of Maribor, Slovenia
Gerald Quirchmayr, University of Vienna, Austria
Muttukrishnan Rajarajan, City University, UK
Kai Rannenberg, Goethe University Frankfurt, Germany
Panagiotis Rizomiliotis, University of the Aegean, Greece
Carsten Rudolph, Fraunhofer Institute for Secure Information Technology, Germany
Christoph Ruland, University of Siegen, Germany
Pierangela Samarati, University of Milan, Italy
Einar Snekkenes, Gjovik University College, Norway
Miguel Soriano,U niversitat Politècnica de Catalunya (UPC), Spain
Diomidis Spinellis, Athens University of Economics and Business, Greece
Paul Spirakis,University of Patras, Greece
Stephanie Teufel, University of Fribourg, iimt, Switzerland
Marianthi Theocharidou, Athens University of Economics & Business, Greece
Yannis Theocharis,University of Mannheim, Germany
Aggeliki Tsochou,Ionian University, Greece
Irene Vassilaki, SCIS, Greece
Maro Vlachopoulou, University of Macedonia, Greece
Vasileios Vlachos, Technological Educational Institute of Larissa, Greece
Spyros Voulgaris, VU University Amsterdam, The Netherlands
Edgar Weippl, Vienna University of Technology, Austria
Christos Xenakis, University of Piraeus, Greece
Constantine Yialouris, Agricultural University of Athens, Greece
Jianying Zhou, Institute for infocomm research, Singapore
Vassilis Zorkadis, Hellenic Data Protection Authority, Greece
Sotiris Karetsos, Agricultural University of Athens, Greece

Download CfP

Jan 31

The Seventh International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies

============== UBICOMM 2013 | Call for Papers ===============

CALL FOR PAPERS, TUTORIALS, PANELS

UBICOMM 2013, The Seventh International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies

September 29 – October 3, 2013 – Porto, Portugal

General page: http://www.iaria.org/conferences2013/UBICOMM13.html

Call for Papers: http://www.iaria.org/conferences2013/CfPUBICOMM13.html

– regular papers

– short papers (work in progress)

– posters

Submission page: http://www.iaria.org/conferences2013/SubmitUBICOMM13.html

Submission deadline: March 30, 2013

Sponsored by IARIA, www.iaria.org

Extended versions of selected papers will be published in IARIA Journals: http://www.iariajournals.org

Print proceedings will be available via Curran Associates, Inc.: http://www.proceedings.com/9769.html

Articles will be archived in the free access ThinkMind Digital Library: http://www.thinkmind.org

Please note the Poster and Work in Progress options.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.
All tracks are open to both research and industry contributions, in terms of Regular papers, Posters, Work in progress, Technical/marketing/business presentations, Demos, Tutorials, and Panels.

Before submission, please check and conform with the Editorial rules: http://www.iaria.org/editorialrules.html

UBICOMM 2013 Topics (topics and submission details: see CfP on the site)

Fundamentals

Semantics of ubiquity; Ubiquitous knowledge; Knowledge discovery mechanisms; Profiling ubiquitous environments; Ubiquitous technologies for education, learning, and training

Mobility

Ubiquitous computing; Wearable computing; Mobile computing; Nomadic computing; Mobile commerce; Mobile learning

Information Ubiquity

Ubiquitous information appliances; Information retrieval and filtering; Context awareness; Control of ubiquitous data; Data management and processing; Data replication, migration and dissemination; Ubiquitous computing and Internet of Things

Ubiquitous Multimedia Systems and Processing

Multimedia content recognition, indexing and search; Mobile graphics, games and entertainment; Ubiquitous multimedia applications and systems; Streaming mobile multimedia; Mobile media management; Multimedia ubiquitous platforms; Multimedia Indexing and Compression; Image and Signal Processing; Virtual reality in ubiquitous systems

Wireless Technologies

Bluetooth; 802.11.x; 802.15.x; ZigBee; WiMax

Web Services

Web 2.0; Semantic web; Web services; Ontology; Web Services evolution; Web Services applications

Ubiquitous networks

Ubiquitous networks; Network management; Network performance evaluation; Networks and technology convergence; Internet access in ubiquitous systems; Ubiquitous mesh, ad hoc and sensor networks; RFID; Reconfigurability and personalization of ubiquitous networks

Ubiquitous devices and operative systems

Design of devices for ubiquitous systems; Mobile devices; Wearable devices; Embedded systems; Operative systems for ubiquitous devices; Real-time operating systems and scheduling

Ubiquitous mobile services and protocols

Frameworks, architectures, and languages for ubiquitous services; Queries, transactions and workflows in mobile and ubiquitous Networks; Algorithms for ubiquitous systems; SLA/QoS in ubiquitous services; Ontology based services; Location-based services; Protocols and interaction mechanisms for ubiquitous services; Mobile services and service convergence; Service discovery mechanisms; Tracking in ubiquitous environments; Measurement, control, and management of ubiquitous services; Design and development of ubiquitous services; Wireless/mobile service delivery

Ubiquitous software and security

Ambient components; Agent technologies; Software for spontaneous interoperation; Dependability guarantees; Security; Key Management and Authentication; Trust; Privacy; Fault-tolerance; Multimedia Information Security

Collaborative ubiquitous systems

Cooperative networks for ubiquitous systems; Cooperative applications for ubiquitous networks; Handheld and wearable systems for interaction in collaborative groups and communities; Ad hoc collaboration in ubiquitous computing environments; Awareness of collaboration and of work environment; Inherently mobile collaborative work

Users, applications, and business models

Mobile user interfaces; Ubiquitous user-generated content (weblogs, wikis, etc.); Mobile and ubiquitous computing support for collaborative learning; User modeling and personalization; Context- and location-aware applications; Toolkits, testbeds, development environments; Tools and techniques for designing, implementing, & evaluating ubiquitous systems; Constructing, deploying and prototyping of ubiquitous applications; Evaluation of user models for ubiquitous environments; On-line analytical techniques; Human-computer interaction in ubiquitous computing environments; Ubiquitous e-Development (business, science, health, etc.); Case Studies; Emerging industrial/business/scientific ubiquitous scenarios; Ambient intelligence; Social issues and implications of ubiquitous system

Committee: http://www.iaria.org/conferences2013/ComUBICOMM13.html

Sep 12

CFP: Conference for E-Democracy and Open Government 2013 « Digital Government & Society

CFP: Conference for E-Democracy and Open Government 2013 « Digital Government & Society.

May 31

CFP: Social and Mobile Media for Governance « Digital Government & Society

The International Conference on e-Democracy and Open Government-Asia 2012 (CeDEM-Asia-2012) is a forum that aims to bring together academics, researchers, policy-makers, industry professionals, and civil society activists to discuss the role of social and mobile media in the future of governance in Asia and elsewhere. CeDEM-Asia-2012 will be held on November 14-15 in Singapore.

Call for Papers

New means of interacting with government and political institutions are causing significant shifts in political and social life. The emerging social and mobile media practices, including content generation, collaboration, and network organization, are changing our understanding of governance and politics. While the changes are already widely debated in mature, developed democracies, there is an even greater need to address them in the context of rapidly developing Asian societies. Following five successful conferences at the Danube University of Krems, CeDEM is looking to open a new forum in Asia for the exchange of ideas, networking, and collaboration on the topics of e-democracy and open government. This year, CeDEM is pleased to be working with the Asian Media Information and Communication Centre (AMIC) as its conference organizer and the Wee Kim Wee School of Communication and Information at Nanyang Technological University, Singapore as its main partner. CeDEM-Asia-2012 seeks to critically analyze present and future developments in field, with a special focus on the following themes:

  • Social media to engage citizens, smart & mobile democracy, sustainability of e-participation
  • Mobilization via social media, networks vs. traditional party-structure, online campaigning
  • Communication technologies and their use for governmental transformation
  • Open data initiatives, transparency, participation and collaboration in government
  • Cultures of governance, access and openness, crowdsourcing for government
  • Information provision, mobile devices, service delivery via new communication channels
  • Online communities, innovation, bottom-up vs. top-down
  • Network effects, power laws, long tail, social web

Conference Chairs

  • Nojin Kwak (University of Michigan, USA)
  • Peter Parycek (Danube University Krems, Austria)
  • Marko M. Skoric (Nanyang Technological University, Singapore)

Submission Guidelines

The submission portal will be open mid June 2012.

  • Research papers, case studies and policy papers should be 12 pages maximum and will be double-blind peer-reviewed.
  • Reflection papers should 6 pages maximum and will be selected by the chairs.
  • Workshop proposals should be no more than 2 pages and will be selected by the chairs.

Publications

The conference proceedings will be published (ISBN) and made available online under the Creative Commons License. A selection of best research papers and case studies of CeDEM-Asia-2012 will be published with the open access eJournal of eDemocracy and Open Government .

Important Dates

  • Submission deadline for full papers and workshop proposals: 15 July 2012
  • Notification of acceptance: 24 September 2012
  • Camera-ready paper submission: 15 October 2012
  • Conference dates & location: 14-15 November 2012, Singapore”

CFP: Social and Mobile Media for Governance « Digital Government & Society.

May 14

Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2012)

FDTC 2012: Call for Papers
==========================
www.fdtc-workshop.eu

The 9th Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC
2012) will be held in Leuven, Belgium, on September 9, 2012. FDTC 2012
is one day before CHES 2012 (September 10-12, 2012). This Call for
Papers is also available for download as a PDF file
(http://conferenze.dei.polimi.it/FDTC12/cfp.pdf).

Motivation & Scope
==================

Fault injection is one of the most exploited means for extracting
confidential information from embedded devices or for compromising their
intended behavior. Research is therefore needed to develop methodologies
and techniques for designing robust cryptographic systems (both hardware
and software), and to protect them against both accidental faults and
intentional intrusions and attacks. Of particular interest is protection
against malicious injection of faults into the device for the purpose of
extracting confidential information.
FDTC is the reference event in the field of fault analysis, attacks and
countermeasures.

Important dates
===============

Extended submission deadline: May 18, 2012, 23:59 UTC
Notification of acceptance:  June 18, 2012
Final version deadline:       July 2, 2012
Workshop:                September 9, 2012

Paper submission
================

Contributions to the workshop describing theoretical studies and
practical case studies of fault diagnosis and tolerance in cryptographic
systems (HW and SW) and protocols are solicited. Topics of interest
include, but are not limited to:

– modelling the reliability of cryptographic systems and protocols
– inherently reliable cryptographic systems and algorithms
– faults and fault models for cryptographic devices (HW and SW)
– novel fault diagnosis and tolerance techniques for cryptographic systems
– attacks exploiting micro-architecture components
– physical protection against attacks
– fault attacks using lasers, electromagnetic induction, and clock /
power supply manipulation
– case studies of attacks, reliability, and fault diagnosis and
tolerance techniques in cryptographic systems
– combined attacks
– fault injection: mechanisms, models and countermeasures
– fault exploitation: analysis, attacks and countermeasures
– fault resistant hardware, fault resistant implementations of
cryptographic algorithms and fault resistant protocols

All submissions should be made using the online submission system:

http://fdtc.ws.dei.polimi.it

Submissions should conform to the instructions below.

Instructions for authors
========================

Submissions must not substantially duplicate work that any of the
authors have published elsewhere or that have been submitted in parallel
in any other conference or workshop. Submissions should be anonymous,
with no author names, affiliations, acknowledgements or obvious
references. Papers should be at most 10 pages (including the
bibliography and appendices), with at least 11pt font and reasonable
margins.

Submission of final papers will be managed directly by Conference
Publishing Services (CPS). Final papers must be formatted following the
instructions in the related author kit (to be communicated). Conference
Publishing Services (CPS) will contact directly the authors for
instructions and will send links to the publishing services.

Accepted papers will be published in an archival proceedings volume by
Conference Publishing Services (CPS) and will be distributed at the time
of the workshop.

At least one author of each accepted paper must register with the
workshop and present the paper in order to be included in the proceedings.

Program committee
=================

Alessandro Barenghi, Politecnico di Milano, Italy
Guido Bertoni, STMicroelectornics, Italy (co-chair)
Christophe Clavier, University of Limoges, France
Wieland Fischer, Infineon Technologies, Germany
Benedikt Gierlichs, KU Leuven, Belgium (co-chair)
Christophe Giraud, Oberthur Technologies, France
Jorge Guarjardo, Bosch, USA
Sylvain Guilley, Telecom ParisTech, France
Helena Handschuh, Intrinsic-ID Inc., USA
Dusko Karaklajic, KU Leuven, Belgium
Kerstin Lemke-Rust, HBRS, Germany
Marcel Medwed, UCL Crypto Group, Belgium
Debdeep Mukhopadhyay, Indian Institute of Technology Kharagpur, India
Matthieu Rivain, CryptoExperts, France
Jörn-Marc Schmidt, TU Graz, Austria
Sergei Skorobogatov, University of Cambridge, UK
Junko Takahashi, NTT Corporation, Japan
Michael Tunstall, University of Bristol, UK
Marc Witteman, Riscure, The Netherlands

Contact with the PC co-chairs is pc2012@fdtc-workshop.eu
========================================================

Steering committee
==================

Luca Breveglieri, Politecnico di Milano, Italy
Israel Koren, University of Massachusetts, USA
David Naccache (chair), Ecole Normale Supérieure, France
Jean-Pierre Seifert, TU Berlin & T-Labs, Germany

FDTC 2012 is in cooperation with IACR – http://www.iacr.org

Apr 27

The 15th Information Security Conference – ISC’12

ISC’12 – Information Security Conference.

Call for Papers

The 15th Information Security Conference (ISC 2012)

Passau, Sept 19-21, 2012

 

http://web.sec.uni-passau.de/isc2012/

 

Paper Submission deadline: 26th of April 7th of May.

 

General Chair: Joachim Posegga

Program co-Chairs: Felix Freiling, Dieter Gollmann

 

The conference seeks submissions from academia, industry and government that present novel research on all theoretical and practical aspects of Information Security. Topics of interest are listed on http://web.sec.uni-passau.de/isc2012/topics.html

 

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All submissions are limited to 16 pages in the llncs style, including bibliography and any appendices; each submission must be intelligible and self-contained within this length. All submissions should be appropriately anonymized (i.e., should not contain author names or affiliations, or obvious citations). Accepted papers will be published by Springer in the Lecture

Notes in Computer Science series.

 

Submissions must be made at http://www.easychair.org/conferences/?conf=isc20120. Please check the full CfP http://web.sec.uni-passau.de/isc2012/ISC2012_call_for_papers.pdf for guidelines, submissions not meeting these guidelines risk rejection without review. At least one author of each accepted paper is required to register with the conference and present the paper. Accepted papers will be published by Springer in the Lecture Notes in Computer Science series.

 

Program Committee:

Magnus Almgren          Joonsang Baek           Alex Biryukov           Sonja Buchegger

Liqun Chen              Xiaofeng Chen           Chen-Mou Cheng          Sherman S. M. Chow

Jorge Cuellar           Vanesa Daza             Claudia Diaz            Roberto Di Pietro

Josep Domingo-Ferrer    Bao Feng                Eduardo B. Fernandez    Josep Ferrer

Sara Foresti            Stefanos Gritzalis      Thorsten Holz           Martin Johns

Angelos Keromytis       Igor Kotenko            Xuejia Lai              Zhenkai Liang

Peng Liu                Javier Lopez            Masahiro Mambo          Mark Manulis

Atsuko Miyaji           Jose Morales            Raphael C.-W. Phan      Frank Piessens

Christian W. Probst     Vincent Rijmen          Matt Robshaw            Kouichi Sakurai

Pierangela Samarati     Jörg Schwenk            Jan Seedorf             Miguel Soriano

Rainer Steinwandt       Willy Susilo            Tsuyoshi Takagi         Lingyu Wang

Susanne Wetzel          Duncan Wong             S.M. Yiu                Jianying Zhou

Alf Zugenmaier          Jeff Yan                Tuomas Aura

 

Publicity Chairs:       Isaac Agudo             Cheng-Kang Chu

 

Important Dates:

Paper Submission deadline:   26th of April 7th of May.

Notification of acceptance: 15th of June.

Proceedings version deadline: 6th of July.

ISC2012 conference:          19th of September – 21st of September.

 

Local Organizing Committee: Eric Rothstein, Marita Güngerich

 

Contact:  

Email : itsec-office AT uni-passau.de    

Phone: +49 851 509 3211

Apr 22

9th Workshop on Fault Diagnosis and Tolerance in Cryptography

FDTC 2012: Call for Papers
==========================
www.fdtc-workshop.eu

The 9th Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC
2012) will be held in Leuven, Belgium, on September 9, 2012. FDTC 2012
is one day before CHES 2012 (September 10-12, 2012). This Call for
Papers is also available for download as a PDF file
(http://conferenze.dei.polimi.it/FDTC12/cfp.pdf).

Motivation & Scope
==================

Fault injection is one of the most exploited means for extracting
confidential information from embedded devices or for compromising their
intended behavior. Research is therefore needed to develop methodologies
and techniques for designing robust cryptographic systems (both hardware
and software), and to protect them against both accidental faults and
intentional intrusions and attacks. Of particular interest is protection
against malicious injection of faults into the device for the purpose of
extracting confidential information.
FDTC is the reference event in the field of fault analysis, attacks and
countermeasures.

Important dates
===============

Paper submission deadline:    May 10, 2012, 23:59 UTC
Notification of acceptance:  June 18, 2012
Final version deadline:       July 2, 2012
Workshop:                September 9, 2012

Paper submission
================

Contributions to the workshop describing theoretical studies and
practical case studies of fault diagnosis and tolerance in cryptographic
systems (HW and SW) and protocols are solicited. Topics of interest
include, but are not limited to:

– modelling the reliability of cryptographic systems and protocols
– inherently reliable cryptographic systems and algorithms
– faults and fault models for cryptographic devices (HW and SW)
– novel fault diagnosis and tolerance techniques for cryptographic systems
– attacks exploiting micro-architecture components
– physical protection against attacks
– fault attacks using lasers, electromagnetic induction, and clock /
power supply manipulation
– case studies of attacks, reliability, and fault diagnosis and
tolerance techniques in cryptographic systems
– combined attacks
– fault injection: mechanisms, models and countermeasures
– fault exploitation: analysis, attacks and countermeasures
– fault resistant hardware, fault resistant implementations of
cryptographic algorithms and fault resistant protocols

All submissions should be made using the online submission system:

http://fdtc.ws.dei.polimi.it

Submissions should conform to the instructions below.

Instructions for authors
========================

Submissions must not substantially duplicate work that any of the
authors have published elsewhere or that have been submitted in parallel
in any other conference or workshop. Submissions should be anonymous,
with no author names, affiliations, acknowledgements or obvious
references. Papers should be at most 10 pages (including the
bibliography and appendices), with at least 11pt font and reasonable
margins.

Submission of final papers will be managed directly by Conference
Publishing Services (CPS). Final papers must be formatted following the
instructions in the related author kit (to be communicated). Conference
Publishing Services (CPS) will contact directly the authors for
instructions and will send links to the publishing services.

Accepted papers will be published in an archival proceedings volume by
Conference Publishing Services (CPS) and will be distributed at the time
of the workshop.

At least one author of each accepted paper must register with the
workshop and present the paper in order to be included in the proceedings.

Program committee
=================

Alessandro Barenghi, Politecnico di Milano, Italy
Guido Bertoni, STMicroelectornics, Italy (co-chair)
Christophe Clavier, University of Limoges, France
Wieland Fischer, Infineon Technologies, Germany
Benedikt Gierlichs, KU Leuven, Belgium (co-chair)
Christophe Giraud, Oberthur Technologies, France
Jorge Guarjardo, Bosch, USA
Sylvain Guilley, Telecom ParisTech, France
Helena Handschuh, Intrinsic-ID Inc., USA
Dusko Karaklajic, KU Leuven, Belgium
Kerstin Lemke-Rust, HBRS, Germany
Marcel Medwed, UCL Crypto Group, Belgium
Debdeep Mukhopadhyay, Indian Institute of Technology Kharagpur, India
Matthieu Rivain, CryptoExperts, France
Jörn-Marc Schmidt, TU Graz, Austria
Sergei Skorobogatov, University of Cambridge, UK
Junko Takahashi, NTT Corporation, Japan
Michael Tunstall, University of Bristol, UK
Marc Witteman, Riscure, The Netherlands

Contact with the PC co-chairs is pc2012@fdtc-workshop.eu
========================================================

Steering committee
==================

Luca Breveglieri, Politecnico di Milano, Italy
Israel Koren, University of Massachusetts, USA
David Naccache (chair), Ecole Normale Supérieure, France
Jean-Pierre Seifert, TU Berlin & T-Labs, Germany

FDTC 2012 is in cooperation with IACR – http://www.iacr.org

Mar 05

CFP 9th International Conference on Security and Cryptography (SECRYPT 2012)

CALL FOR PAPERS

************************************************************************
9th International Conference on Security and Cryptography (SECRYPT 2012)
Rome, Italy, July 24-27, 2012
http://secrypt.icete.org
************************************************************************

SECRYPT is an annual international conference covering research in
information and communication security.  The 9th International
Conference on Security and Cryptography (SECRYPT 2012) will be held in
Rome, Italy.  The conference seeks submissions from academia,
industry, and government presenting novel research on all theoretical
and practical aspects of data protection, privacy, security, and
cryptography.  Papers describing the application of security
technology, the implementation of systems, and lessons learned are
also encouraged.  The conference topics include, but are not limited
to:

– Access Control
– Applied Cryptography
– Authentication
– Biometrics Security and Privacy
– Critical Infrastructure Protection
– Data Integrity
– Data Protection
– Database Security and Privacy
– Digital Forensics
– Digital Rights Management
– Ethical and Legal Implications of Security and Privacy
– Formal Methods for Security
– Human Factors and Human Behaviour Recognition Techniques
– Identification, Authentication and Non-repudiation
– Identity Management
– Information Hiding
– Information Systems Auditing
– Insider Threats and Countermeasures
– Intellectual Property Protection
– Intrusion Detection & Prevention
– Management of Computing Security
– Network Security
– Organizational Security Policies
– Peer-to-Peer Security
– Personal Data Protection for Information Systems
– Privacy
– Privacy Enhancing Technologies
– Reliability and Dependability
– Risk Assessment
– Secure Cloud Computing
– Secure Software Development Methodologies
– Security Protocols
– Security and Privacy in Mobile Systems
– Security and Privacy in Complex Systems
– Security and Privacy in IT Outsourcing
– Security and Privacy in Location-based Services
– Security and Privacy in Pervasive/Ubiquitous Computing
– Security and Privacy in Social Networks
– Security and Privacy in Web Services
– Security and Privacy Policies
– Security Area Control
– Security Deployment
– Security Engineering
– Security for Grid Computing
– Security in Distributed Systems
– Security Information Systems Architecture and Design and Security
Patterns
– Security Management
– Security Metrics and Measurement
– Security Requirements (Threats, Vulnerabilities, Risk, Formal
Methods, etc.)
– Security Verification and Validation
– Sensor and Mobile Ad Hoc Network Security
– Service and Systems Design and QoS Network Security
– Software Security
– Trust Management and Reputation Systems
– Ubiquitous Computing Security
– Wireless Network Security (WiFi, WiMAX, WiMedia and others)

PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings.  All submissions should be appropriately
anonymized (i.e., papers should not contain author names or
affiliations, or obvious citations). Submissions are to be made to the
submission web site at http://www.insticc.org/Primoris.

Two categories of papers can be submitted:

– Full Paper: A full paper presents a work where the research is
completed or almost finished.  Authors of regular submitted papers
will indicate at the time of submission whether they would like
their paper to also be considered for publication as a position
paper.
– Position Paper: A position paper presents results that are
preliminary or that simply require few pages to describe. A position
paper may be a short report and discussion of ideas, facts,
situations, methods, procedures, or results of scientific research
(bibliographic, experimental, theoretical, or other) focused on one
of the conference topics. The acceptance of a position paper is
restricted to the categories of “short paper” or “poster”.

Submitted papers must be formatted according to the SECRYPT format
(with the exception that authors should be blinded in the submission),
which is described at http://secrypt.icete.org/paper_formats.asp.
Submission page limit is 10 pages for full paper and 6 pages for position papers.
Accepted papers will be subject to the limit of: 10 pages (for full papers), 6
pages (for short papers), and 4 pages (for posters).  Submitted papers
will be subject to a double-blind review process.  All submissions
should be anonymized. All accepted papers/posters will be published in
the conference proceedings.  A short list of presented papers will be
selected so that revised and extended versions of these papers will be
published by Springer-Verlag in a CCIS Series book.  Authors of
accepted papers/posters must guarantee that their papers/posters will be
presented at the conference.

IMPORTANT DATES
Full Paper submission: March 19, 2012
Authors Notification (full papers): May 4, 2012
Final Full Paper Submission and Registration: May 14, 2012

CONFERENCE CHAIR
Mohammad S. Obaidat, Monmouth University, U.S.A.

PROGRAM CHAIR
Pierangela Samarati, Universita’ degli Studi di Milano, Italy

PROGRAM CO-CHAIRS
Wenjing Lou, Virginia Polytechnic Institute and State University, United States
Jianying Zhou, Institute For Infocomm Research, Singapore

PROGRAM COMMITTEE
Claudio Ardagna, Universita` degli Studi di Milano, Italy
Ken Barker, University of Calgary, Canada
Carlo Blundo, Università di Salerno,, Italy
David Chadwick, University of Kent ,United Kingdom
Aldar Chan, Institute for Infocomm Researc,h Singapore
Ee-chien Chang, National University of Singapore Singapore
Yingying Chen, Stevens Institute of Technology,, United States
Cheng-Kang Chu, Institute for Infocomm Research, Singapore
Marco Cova, University of Birmingham,, United Kingdom
Jorge Cuellar, Siemens AG,, Germany
Frédéric Cuppens, Ecole Nationale de Télécommunications de Bretagne,, France
Reza Curtmola,  New Jersey Institute of Tech,, United States
Ricardo Dahab, University of Campinas (UNICAMP) ,, Brazil
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Roberto Di Pietro, Universita’ di Roma Tre,, Italy
Tassos Dimitriou, Athens Information Technology,, Greece
Josep Domingo-ferrer, Rovira I Virgili University of Tarragona, Spain
Eduardo B. Fernandez, Florida Atlantic University, United States
Eduardo Fernández-medina, University of Castilla-La Mancha, Spain
Alberto Ferrante, University of Lugano, Switzerland
Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain
Simone Fischer-Hübner, Karlstad University, Sweden
Sara Foresti, Universita’ degli Studi di Milano, Italy
Keith Frikken, Miami University of Ohio, United States
Steven Furnell, University of Plymouth, United Kingdom
Mark Gondree, Naval Postgraduate School, United States
Dimitris Gritzalis, AUEB, Greece
Yong Guan, Iowa State University, United States
Xinyi Huang, Fujian Normal University, China
Michael Huth, Imperial College London, United Kingdom
Cynthia Irvine, Naval Postgraduate School, United States
Sokratis Katsikas, University of Piraeus, Greece
Stefan Katzenbeisser, Technische Universität Darmstadt, Germany
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan
Costas Lambrinoudakis, University of Piraeus, Greece
Bo Lang Beijing, University of Aeronautics and Astronautics, China
Loukas Lazos,  University of Arizona, United States
Adam J. Lee,  University of Pittsburgh, United States
Patrick Lee,  Chinese University of Hong Kong Hong Kong
Albert Levi, Sabanci University, Turkey
Jiguo Li, Hohai University, China
Ming Li, Utah State University, United States
Giovanni Livraga, Universita degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Emil Lupu, Imperial College, United Kingdom
Luigi Mancini, University of Rome La Sapienza, Italy
Olivier Markowitch, Université Libre de Bruxelles, Belgium
Vashek Matyas, Masaryk University Czech Republic
Carlos Maziero, UTFPR – Federal University of Technology – Paraná state, Brazil
Chris Mitchell, Royal Holloway, University of London, United Kingdom
Atsuko Miyaji, Japan Advaned Institute of Science and Technology, Japan
Marco Casassa-Mont, Hewlett-Packard Laboratories, United Kingdom
David Naccache, Ecole Normale Superieure, France
Guevara Noubir,  Northeastern University, United States
Eiji Okamoto, University of Tsukuba, Japan
Rolf Oppliger, eSECURITY Technologies, Switzerland
Stefano Paraboschi, University of Bergamo, Italy
Gerardo Pelosi, Politecnico di Milano, Italy
Günther Pernul, University of Regensburg, Germany
Raphael C.-w. Phan, Loughborough University, United Kingdom
Radha Poovendran,  University of Washington, United States
Joachim Posegga, Institute of IT Security and Security Law, Germany
Kui Ren, Illinois Institute of Technology, United States
Jian Ren, Michigan State University, United States
Sushmita Ruj, University of Ottawa Canada
Gokay Saldamli Bogazici, University MIS department, Turkey
Martin Schläffer, Graz University of Technology, Austria
Miguel Soriano, UPC, Spain
Cosimo Stallo, University of Rome Tor Vergata, Italy
Neeraj Suri, Technische Universität Darmstadt, Germany
Willy Susilo, University of Wollongong, Australia
Chiu Tan, Temple University, United States
Juan Tapiador, Universidad Carlos III de Madrid, Spain
Wen-guey Tzeng, National Chiao Tung University, Taiwan
Guilin Wang, University of Wollongong, Australia
Xinyuan (Frank) Wang, George Mason University , United States
Haining  Wang, The College of William and Mary, United States
Lingyu Wang, Concordia University Canada
Osman Yagan, Carnegie Mellon University, United States
Danfeng Yao, Virginia Tech, United States
Alec Yasinsac, University of South Alabama, United States
Shucheng Yu, University of Arkansas at Little Rock, United States
Wensheng Zhang, Iowa State University, United States
Futai Zhang, Nanjing Normal University, China
Wen Tao Zhu, Graduate University of Chinese Academy of Sciences, China

This call for papers and additional information about the conference
can be found at http://secrypt.icete.org/

For any questions, please contact the program chairs:
secrypt2012@unimi.it

———————————————–

SECRYPT 2012 is part of the International Joint Conference on e-Business and
Telecommunications (ICETE 2012) that has 5 more conferences with very strong synergies between them, namely:

– DCNET: Int’l Conference on Data Communication Networking (http://www.dcnet.icete.org)
– ICE-B: Int’l Conference on e-Business (http://www.ice-b.icete.org)
– OPTICS: Int’l Conference on Optical Communication Systems (http://www.optics.icete.org)
– SIGMAP: Int’l Conference on Signal Processing and Multimedia Applications (http://www.sigmap.icete.org)
– WINSYS: Int’l Conference on Wireless Information Networks and Systems (http://www.winsys.icete.org)

The conference program features a number of Keynote Lectures to be delivered by
distinguished world-class researchers, namely:
– Venu Govindaraju, University at Buffalo, United States
– Sushil Jajodia, George Mason University Fairfax, United States
– Andreas Holzinger, Medical University Graz, Austria
– Geoffrey Charles Fox, Indiana University, United States
http://www.icete.org/KeynoteSpeakers.aspx

Feb 16

PROOFS: Security Proofs for Embedded Systems

PROOFS: Security Proofs for Embedded Systems

http://www.proofs-workshop.org

Call for papers: http://www.proofs-workshop.org/PROOFS_cfp.pdf

Goal of the Workshop:

The goal of the PROOFS workshop is to promote methodologies that increase the confidence level in the security of embedded systems, especially those that contain cryptographic mechanisms. Embedded system security currently consists mainly in security by obscurity solutions. This has obvious drawbacks: it requires costly black-box evaluation, there is no certainty about the correctness of the security, etc. Formal methods allow to increase the trust level of digital systems. They are very appealing, for the following reasons: they are mature in theory, and there are tried and tested methods and tools, they have been applied on software for a long time, mainly for safety and conformance tests. Some important security features (random number generation, physically unclonable functions, etc.) rely on analog devices. Their correct functioning can be ascertained by techniques such as physical modeling and unitary experimental testing. An important objective for the PROOFS workshop is to bridge the gap between both topics, and therefore to pave the way to « security by clarity » for embedded systems.

Venue: PROOFS will take place at Leuven, Belgium, on September 13rd, 2012.

The workshop will feature two/three invited talks and contributed talks.

The agenda is:

Diffusion of the CfP: Thursday February 16th
Submission deadline: Sunday May 6th
Authors notification: Sunday July 1st
Final version due: Sunday July 15th
PROOFS workshop venue: Thursday September 13rd

Programme Committee
Alessandro Barenghi, Politecnico di Milano, Italy.
Gilles Barthe, Fundación IMDEA Software, Spain.
Loïc Correnson, CEA LIST, France.
Emmanuelle Encrenaz, LIP6, France.
Éliane Jaulmes, ANSSI, France.
Naofumi Homma, Tohoku U., Japan.
Debdeep Mukhopadhyay, IIT Kharagpur, India.
Svetla Nikova, K.U.Leuven, Belgium.
Renaud Pacalet, TELECOM-ParisTech, France.
Bruno Robisson, ENSMSE, France.
Graham Steel, LSV, France.

Steering committee
Sylvain Guilley, TELECOM-ParisTech, France.
David Naccache, ENS, France.
Akashi Satoh, AIST, Japan.
Werner Schindler, BSI, Germany.

Feb 08

CFP WISSE’12 CAiSE’12

**** CALL FOR PAPERS ****

 

Second International Workshop on Information Systems Security Engineering –  WISSE’12

http://gsya.esi.uclm.es/WISSE2012/

in conjunction with the

24th International Conference on Advanced Information Systems Engineering (CAiSE’12)

Gdańsk, Poland, 25 – 29 June 2012

http://www.caise2012.univ.gda.pl/

Important Dates

Paper Submission:  February 27, 2012 (extended)

Authors Notification: March 17, 2012 (extended)

Camera Ready Submission Deadline: March 23, 2012 (extended)

 

Purpose

Information systems security problems are currently a widespread and growing concern that covers most of the areas of society, such as business, domestic, financial, government, healthcare, and so on. The scientific community has realized the importance of aligning information systems engineering and security engineering in order to develop more secure information systems. Nevertheless, there is lack of an appropriate event that will promote information systems security within the context of information systems engineering. The proposed workshop fulfils this gap. This is the second version of the workshop, with the first one being introduced in CAiSE’11 with great success.

The workshop aims to provide a forum for researchers and practitioners to present, discuss and debate on one hand the latest research work on methods, models, practices and tools for secure information systems engineering, and on the other hand relevant industrial applications, recurring challenges, problems and industrial led solutions at the area of secure information systems engineering.

 

Topics of interest:

Topics of interest include, but are not limited to:

–          Security and privacy requirements models and engineering

–          Security and privacy analysis methods and models

–          Security and privacy design methods and models

–          Security and privacy testing methods and models

–          Security and privacy modelling Support Tools

–          Integrating functional, security and privacy requirements

–          Threat-driven and Model-driven security

–          Secure IS interoperability modelling

–          Security and process modelling

–          Modelling Security and Trust

–          Managing Secure Software development

–          Security in Agile Software Development Methods

–          Methodologies and models for evaluating IS security and privacy aspects

–          Formal methods for modelling security

–          Models and approaches for the verification of security and privacy properties

–          Approaches for managing security changes in IS

–          Component-based, Aspect-oriented, Agent-based, Pattern-based Information system Security methods

–          Methods, models and tools for workflow and Business Process Security

–          Case studies in modelling secure IS

–          Security Architectures and Patterns for Information Systems

–          Semantic Web Technologies applied to Security

–          Ontologies for IS security

–          Security Engineering for specific Information Systems (e-Services, databases, mobile, internet, social networks, …)

–          Security Engineering for SOA Systems

–          Methods for security reengineering

–          Software Security Knowledge

–          Enterprise Software Security

 

Paper Submission

Prospective authors are invited to submit papers in any of the topics of the workshop. The results described must be unpublished and must not be under review elsewhere. Only papers in English will be accepted, and the length of the paper should not exceed 14 pages (including all text, figures, references and appendices.). Three to five keywords characterising the paper should be indicated at the end of the abstract.

Manuscripts must comply with the Springer NLBIP formatting rules. Prepare your manuscript as a PDF file and submit it to the workshop organizers via EasyChair system (https://www.easychair.org/conferences/?conf=wisse12).

Submissions not conforming to the LNCS format, exceeding 14 pages, or being obviously out of the scope of the workshop, will be rejected without review.

Best workshop papers will be published in a special issue of the International Journal of Information System Modeling an Design.

Registration

For each accepted submission, at least one author is expected to register for the workshop and attend the workshop in order to present the paper. Registration is through the CAiSE’12 web site.

 

Workshop Structure

The workshop will combine paper presentations, a keynote, and a panel. Moreover, accepted papers apart from presentation time, will be assigned with one or two discussants with responsibility to initiate the discussion on the paper. We are confident that such structure will support a workshop environment that will be based on discussion, debate and will therefore provide an important contribution to the relevant research community.

 

List of PC members

Alban Gabillon. Université de Polynésie Française.

Antonio Maña. University of Malaga. Spain

Benoit Baudry. IRISA Rennes. France

Brajendra Panda. University of Arkansas. USA

Carlos Blanco. University of Cantabria. Spain

Christos Kalloniatis, University of the Aegean, Greece

Csilla Farkas. University of South Carolina. USA

Cuppens Nora. LUSSI/SERES Telecom-Bretagne. France

Daniel Mellado. Spanish Tax Agency. Spain

Eduardo Fernández-Medina. University of Castilla-La Mancha. Spain

Eduardo B. Fernández. Florida Atlantic University. USA

Ernesto Damiani. Università degli Studi di Milano. Italy

Frédéric Cuppens. Telecom Bretagne. France

Günther Pernul. University of Regensburg. Germany

Guttorm Sindre, NTNU, Norway

Indrakshi Ray. Colorado State University. USA

Isabelle Comyn-Wattiau. CNAM. Paris, France

Jacky Akoka. CEDRIC-CNAM. France

Jaejoon Lee. Lancaster University. UK

Jan Jürjens, Technical University of Dortmund, Germany

Javier López. University of Málaga. Spain

Kouichi Sakurai. Kyushu University. Japan

Luis Enrique Sánchez. University of Castilla-La Mancha. Spain

Marc Frappier. University of Sherbrooke. Québec

Matt Bishop. University of California. USA

Paolo Giorgini. University of Trento. Italy

Régine Laleau. LACL, Université Paris-Est Créteil. France

Sabrina De Capitani di Vimercati. Università degli Studi di Milano. Italy

Shareeful Islam, University of East London, UK.

Steven Furnell. Plymouth University. UK

Yves Ledru. LIG, University of Grenoble. France

 

Workshop organization

 

General Chair:

Dr Haralambos Mouratidis

University of East London. UK

H.Mouratidis@uel.ac.uk

 

Programme Chairs:

Dr. David G. Rosado

University of Castilla-La Mancha. Spain

David.GRosado@uclm.es

 

Dr Nadira Lammari

CEDRIC-CNAM. France

lammari@cnam.fr

 

Steering Committee Chair

Dr Nadira Lammari

CEDRIC-CNAM. France

lammari@cnam.fr

 

Steering Committee

Dr Nora Cuppens

LUSSI/SERES Telecom-Bretagne. France

nora.cuppens@telecom-bretagne.eu

 

Dr. Jan Jürjens

Technical University of Dortmund. Germany

jan.jurjens@cs.tu-dortmund.de

 

Dr Haralambos Mouratidis

University of East London. London

H.Mouratidis@uel.ac.uk

 

Dr. David G. Rosado

University of Castilla-La Mancha. Spain

David.GRosado@uclm.es

 

Dr. Luis Enrique Sánchez

University of Castilla-La Mancha. Spain

LuisE.Sanchez@uclm.es

 

Publicity chairs:

Dr Shareeful Islam

University of East London. London

S.Islam@uel.ac.uk

 

Dr Carlos Blanco

University of Cantabria. Spain

carlos.blanco@unican.es

 

Dr Jérémy Milhau

LACL, Université Paris-Est Créteil. France

jeremilhau@gmail.com