Tag: communication

Aug 14

UDD 2012 : Special Session on Undesirable Data Detection

 

UDD 2012 : Special Session on Undesirable Data Detection

Link: http://www.mirlabs.net/ias12/ss1.html
When Nov 21, 2012 – Nov 23, 2012
Where São Carlos, Brazil
Submission Deadline Aug 15, 2012
Notification Due Sep 15, 2012
Final Version Due Sep 30, 2012
Categories    undesirable data detection   security

Call For Papers

Call for Papers of the Special Session on
Undesirable Data Detection — UDD 2012

Under the framework of the 8th International Conference on Information Assurance and Security (IAS 2012), 21-23 November 2012 in São Carlos, Brazil

Objectives
In recent years, research in the area of ICT security grows rapidly, mainly thanks to growing number of security threats arising internally or externally. Undesirable behavior comprising any intentionally or unintentionally misuse of resources in information systems produces growing quantity of new undesirable data every day. Undesirable Data Detection (http://www.mirlabs.net/ias12/ss1.html) Special Session aims at presenting novel approaches for evaluating or detecting potentially malicious activity threatening the security of ICT.
The special session seeks contributions about foundations of undesirable data detection as well as case studies, empirical, and other methodological works. It will provide an opportunity to disseminate latest results in this important field.
This section is focused on mining or detection of the undesirable data (such as spam emails and other unsolicited message in any communication system) and on its optimization for all possible aspects of security. Moreover, the session focuses on engines for Intrusion Detection Systems detection based on rules and on data elaboration, with special care of solution able to support data parallelization and GPU computing. Last but not least the special session aims at collecting case studies and real application of Undesirable data detection.

Specific topics of interest
The preferred topics for this special session are (but not limited to):
• Detection techniques and Methodologies
o Spam detection
o Intrusion detection
o Similarity detection
o Plagiarism detection
o Dangerous patterns in data streams
o Steganography detection
• Detection Techniques Application
o Scalable IDs architecture
o GPU and parallel Computing for Undesirable Data and Intrusion Detection
• Intrusion and Undesirable Data Detection Case Studies
o Detection in network systems
o Intrusion Detection in Cloud systems
o Industrial and real case studies

Submission
Special Session paper submission will be done through IAS 2012 submission system and been evaluated with the same standard as the regular conference paper. All accepted papers will be included in the IAS 2012 conference proceedings.
Papers must be submitted within the stipulated time and electronic submission in PDF is required. A full paper (6 pages, A4 size) for oral presentation should in the IEEE 8.5 two-column format. Papers should contain up to 5 keywords. Papers will be evaluated for originality, significance, clarity, and soundness, and will be reviewed by at least three independent reviewers.

Details are available at the conference website http://www.mirlabs.net/ias12/. Submit your paper at the submission site https://www.easychair.org/account/signin.cgi?conf=ias12.

Program Chair
Vaclav Snášel, Department of Computer Science, VSB – Technical University of Ostrava, vaclav.snasel@vsb.cz

Session Coordinators
Eliška Ochodková, eliska.ochodkova@vsb.cz
Pavel Krömer, pavel.kromer@vsb.cz

Program committee
Vaclav Snasel, VSB-Technical University of Ostrava, Czech Republic, vaclav.snasel@vsb.cz
Milos Kudelka, VSB-Technical University of Ostrava, Czech Republic, milos.kudelka@vsb.cz
Pavel Kromer, VSB-Technical University of Ostrava, Czech Republic, pavel.kromer@vsb.cz
Jan Platos, VSB-Technical University of Ostrava, Czech Republic, jan.platos@vsb.cz
Pavel Moravec, VSB-Technical University of Ostrava, Czech Republic, pavel.moravec@vsb.cz
Petr Gajdos, VSB-Technical University of Ostrava, Czech Republic, petr.gajdos@vsb.cz
Jan Martinovic, VSB-Technical University of Ostrava, Czech Republic, jan.martinovic@vsb.cz
Petr Musilek, University of Alberta, Canada, musilek@ece.ualberta.ca
Suhail S. Owais, AL-Balaqa University, Jordan, suhailowais@yahoo.com
Hideyasu Sasaki, University of Hong Kong, Hong Kong, hsasaki@uchicago.edu
Juan D. Velasquez, University of Chile, Santiago, Chile, juansensei@gmail.com
Miroslav Voznak, VSB-Technical University of Ostrava, Czech Republic, miroslav.voznak@vsb.cz

UDD 2012 : Special Session on Undesirable Data Detection.

Aug 14

WiSec 2013 : The Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks

 

WiSec 2013 : The Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks

Link: http://www.crysys.hu/recent-news/229-wisec-2013.html
When Apr 17, 2013 – Apr 19, 2013
Where Budapest, Hungary
Submission Deadline Oct 29, 2012
Notification Due Jan 20, 2013
Final Version Due Feb 15, 2013
Categories    wireless   security   communications   networks

Call For Papers

* ACM approval pending

*** PRELIMINARY CALL FOR PAPERS ***

IMPORTANT DATES

Submission Deadline: Oct 29
Notification Date: Jan 20
Camera-Ready Deadline: Feb 15

BROADENED SCOPE

WiSec has been broadening its scope and seeks to present high quality
research papers exploring security and privacy aspects of wireless
communications, mobile networks, and their applications. Beyond the
traditional Wisec staples of physical, link, and network layer security, we
also welcome papers focusing on the security and privacy of mobile software
platforms and the increasingly diverse range of mobile or wireless
applications. The conference welcomes both theoretical as well as systems
contributions.

Topics of interest include, but are not limited to:
* Mobile malware and platform security
* Security & Privacy for Smart Devices (e.g., Smartphones)
* Wireless and mobile privacy and anonymity
* Secure localization and location privacy
* Cellular network fraud and security
* Jamming attacks and defenses
* Key extraction, agreement, or distribution in wireless and mobile
settings
* Theoretical foundations, cryptographic primitives, and formal
methods for wireless security and privacy
* NFC and smart payment applications
* Security and privacy for mobile sensing systems
* Wireless or mobile security and privacy in health, automotive,
avionics, or smart grid applications

The proceedings of ACM WiSec will be published by the ACM (pending
approval).

FULL AND SHORT PAPERS: Full paper submissions to WiSec 2013 can be up to 10
pages in the ACM conference style excluding the bibliography and well marked
appendices, and up to 12 pages in total. WiSec also encourages the
submission of short papers with a length of up to 6 pages, which describe
mature work of a more succinct nature. All papers must be thoroughly
anonymized for double-blind reviewing. Detailed submission instructions
will appear on the conference website
(http://www.sigsac.org/wisec/WiSec2013/SubInstructions.php).

DOUBLE SUBMISSIONS: It is a policy of the ACM
(http://www.acm.org/publications/policies/RightsResponsibilities) to
disallow double submissions, where the same (or substantially similar)
paper is concurrently submitted to multiple conferences/journals. Any
double submissions detected will be immediately rejected from all
conferences/journals involved.

ORGANIZERS

General Chair
Levente Buttyan, Budapest University of Technology and Economics, Hungary

Technical Program Chairs
Ahmad-Reza Sadeghi, Technische Universität Darmstadt, Germany
Marco Gruteser, Rutgers University, USA

Steering committee
N. Asokan, NRC, Finland
Levente Buttyan, BME, Hungary
Claude Castelluccia, INRIA, France
Jean-Pierre Hubaux, EPFL, Switzerland
Douglas Maughan, DHS, USA
Adrian Perrig, CMU, USA
Gene Tsudik, UCI, USA (chair)
Dirk Westhoff, HAW, Germany

WiSec 2013 : The Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks.

Aug 14

ASIACCS 2013 : 8th ACM Symposium on Information, Compuer and Communications Security

 

ASIACCS 2013 : 8th ACM Symposium on Information, Compuer and Communications Security

Link: http://hise.hznu.edu.cn/asiaccs/
When May 8, 2013 – May 10, 2013
Where Hangzhou, China
Submission Deadline Nov 30, 2012
Categories    security

Call For Papers

Building on the success of ACM Conference on Computer and Communications Security (CCS) and ACM Transactions on Information and System Security (TISSEC), the ACM Special Interest Group on Security, Audit, and Control (SIGSAC) formally established the annual ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS). The inaugural ASIACCS was held in Taipei (2006). Since then the ASIACCS have been held in Singapore (2007), Tokyo (2008), Sydney (2009), Beijing (2010), Hong Kong (2011), and Seoul (2012). ASIACCS 2013 is the eighth conference of the series.

ASIACCS is a major international forum for information security researchers, practitioners, developers, and users to explore and exchange the newest cyber security ideas, breakthroughs, findings, techniques, tools, and experiences. We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of computer and network security. Areas of interest for ASIACCS 2012 include, but are not limited to:

access control

identity management

privacy-enhancing technology

accounting and audit

Inference control and disclosure

security in ubiquitous computing

applied cryptography

information warfare

security management

authentication

intellectual-property protection

smartcards

cloud computing security

intrusion detection

software security

data/system integrity

key management

trusted computing

data and application security

malware and botnets

wireless security

digital-rights management

mobile-computing security

web security

formal methods for security

operating system security

hardware-based security

phishing and countermeasures

Important Dates

Submission Deadline: 30 November 2012, 23:59 UTC (Firm Deadline)
Acceptance Notification: 29 January 2013
Camera-ready Copy Due: 18 February 2013
Conference: 8-10 May 2013

Instructions for authors Submissions must be written in English, and must be at most 10 pages in 10pt, double-column format excluding the bibliography and well-marked appendices, and at most 12 pages overall. Committee members are not required to read appendices, so the paper should be intelligible without them. Submissions must be in ACM SIGPLAN format (http://www.sigplan.org/authorInformation.htm) with page numbers (so, LaTeX users should specify documentclass[10pt,preprint]{sigplanconf}). No changes to margins, spacing, or font sizes (or anything else) are allowed from those specified by the style file. We reserve the right to request the source files for a submission to verify compliance with this requirement. Only PDF files will be accepted.

All submissions must be anonymized. An author’s name should occur only in references to that author’s related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the conference.

Accepted papers will be published by ACM Press in conference proceedings and in the ACM Digital Library. Final proceedings versions will be 10 pages in double-column ACM format, although authors will have the option of buying a limited number of additional pages. In addition to regular papers, some short papers could also be accepted and included in the proceedings.

ASIACCS 2013 : 8th ACM Symposium on Information, Compuer and Communications Security.

Aug 09

3rd International Conference on Cloud Computing and Services Science

CALL FOR PAPERS

3rd International Conference on Cloud Computing and Services Science
CLOSER website: http://closer.scitevents.org

May 8 – 10, 2013
Aachen, Germany

Co-organized by: RWTH
Sponsored by: INSTICC
INSTICC is Member of: WfMC and OMG
Technically sponsored by: SINTEF

IMPORTANT DATES:
Regular Paper Submission: November 15, 2012
Authors Notification (regular papers): January 17, 2013
Final Regular Paper Submission and Registration: February 7, 2013

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

We would like to draw your attention to the 3rd International Conference on Cloud Computing and Services Science (CLOSER 2013 – http://closer.scitevents.org) whose submission deadline is scheduled for November 15, 2012. We hope you can participate in this conference by submitting a paper reflecting your current research in any of the following areas:

– Cloud Computing Fundamentals
– Services Science Foundation for Cloud Computing
– Cloud Computing Platforms and Applications
– Cloud Computing Enabling Technology

The conference will be sponsored by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), co-organized by the Aachen University (RWTH) and technically sponsored by SINTEF. INSTICC is Member of the Workflow Management Coalition (WfMC) and Object Management Group (OMG).

The 3rd International Conference on Cloud Computing and Services Science, CLOSER 2013, focuses on the emerging area of Cloud Computing, inspired by some latest advances that concern the infrastructure, operations, and available services through the global network. Further, the conference considers as essential the link to Services Science, acknowledging the service-orientation in most current IT-driven collaborations. The conference is nevertheless not about the union of these two (already broad) fields, but about Cloud Computing where we are also interested in how Services Science can provide theory, methods and techniques to design, analyze, manage, market etc.

We would like to highlight the presence of the following keynote speakers:
– Gottfried Vossen, WWU Münster, Germany
– Ivona Brandic, Vienna UT, Austria

CLOSER is interested in promoting high quality research as it can be confirmed by last year acceptance rates, where from 145 submissions, 19% were accepted as full papers. Additionally, 30% were presented as short papers and 14% as posters.

Submitted papers will be subject to a double-blind review process. All accepted papers (full, short and posters) will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support. EHHC
A short list of presented papers will be selected for publication of extended and revised versions in a Special Issue of the Journal of Future Generation Computer Systems. Also a short list of presented papers will be selected so that revised and extended versions of these papers will be published by Springer-Verlag in a SSRI Series book.

The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP and EI (Elsevier Index).
All papers presented at the conference venue will be available at the SciTePress Digital Library (http://www.scitepress.org/DigitalLibrary/). SciTePress is member of CrossRef (http://www.crossref.org/).

Best paper awards will be distributed during the conference closing session. Please check the website for further information (http://closer.scitevents.org/BestPaperAward.aspx).

We also would like to highlight the possibility to submit to the following Special Session, whose deadline is scheduled for March 1, 2013:
– Special Session on Security Governance and SLAs in Cloud Computing (CloudSecGov)
http://closer.scitevents.org/CloudSecGov.aspx

Workshops, Special sessions, Tutorials as well as Demonstrations dedicated to other technical/scientific topics are also envisaged: companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat. Workshop chairs and Special Session chairs will benefit from logistics support and other types of support, including secretariat and financial support, to facilitate the development of a valid idea.

CLOSER 2013 will be held in conjunction with WEBIST 2013 (International Conference on Web Information Systems and Technologies – www.webist.org/), CSEDU 2013 (International Conference on Computer Supported Education – http://www.csedu.org/) and SMARTGREENS 2013 (International Conference on Smart Grids and Green IT Systems – http://www.smartgreens.org/) in Aachen, Germany. Registration to CLOSER will enable free attendance to any sessions of WEBIST, CSEDU and SMARTGREENS conferences as a non-speaker.

Please check further details at the CLOSER conference website (http://closer.scitevents.org).
Should you have any question please don’t hesitate contacting me.

Kind regards,
Joao Teixeira
CLOSER Secretariat

Av. D. Manuel I, 27A 2.Esq.
2910-595 Setubal, Portugal
Tel.: +351 265 520 184
Fax: +44 203 014 8638
Email: closer.secretariat@scitevents.org

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

CONFERENCE CHAIR:
Matthias Jarke, RWTH Aachen, Germany

PROGRAM CO-CHAIRS:
Frederic Desprez, LIP / INRIA, France
Donald Ferguson, Dell, United States
Ethan Hadar, CA Technologies, Israel
Frank Leymann, University of Stuttgart, Germany

PROGRAM COMMITTEE:
Please check the program committee members at http://closer.scitevents.org/ProgramCommittee.aspx

CONFERENCE AREAS:

Area 1: Cloud Computing Fundamentals

– Cloud Computing Architecture
– Cloud Standards
– Cloud Application Portability
– Cloud Interoperability
– Cloud Delivery Models
– Cloud Deployment Models: Public/Private/Hybrid Cloud
– Cloud Risk, Challenges, and Governance
– Business Cloud vs. Software Cloud

Area 2: Services Science Foundation for Cloud Computing

– Semantic Web Technologies
– Web Services
– Service and Systems Design and QoS Network Security
– Service-Oriented Architecture
– Internet of Services
– Service Modeling and Specification
– Service Composition
– Service Discovery
– Service Monitoring and Control
– Business Services Realized by IT Services
– Service Innovation
– Service Operation
– Service Strategy
– Service Marketing and Management
– Information and Service Economy
– Human Beings in Service Systems
– Enterprise Architectures and Services

Area 3: Cloud Computing Platforms and Applications

– Vertical Specific Cloud Services
– Mobility
– Cloud Middleware Frameworks
– Cloud Application Architectures
– Cloud Application Scalability and Availability
– XaaS
– ITaaS
– COTS and Cloud
– Cloudsourcing
– Cloud Applications Performance and Monitoring
– Development Methods for Cloud Applications
– Economics (ROI, Costs, CAPEX/OPEX,.)
– Outsourced Production Environments
– Collective Intelligence/Crowd Computing
– Context-aware Computing and Peer to Peer Computing
– Big Data Cloud Services

Area 4: Cloud Computing Enabling Technology

– Troubleshooting and Best Practices
– Monitoring of Services, Quality of Service, Service Level Agreements
– Security and Cyber Security in the Cloud
– Performance Development and Management
– Cloud Ilities (Scalability, Availability,Reliability)
– Dynamic Capacity and Performance Management
– Cloud Optimization and Automation
– Virtualization Technologies
– Disaster Recovery
– Cloud Abstraction of Composite IT Systems
– Cloud IT Systems Reuse

 

Aug 09

Eleventh Smart Card Research and Advanced Application Conference – Cardis 2012

CARDIS 2012 – Call for Papers
—————————–
Eleventh Smart Card Research and Advanced Application Conference

Since 1994, CARDIS is the foremost international conference dedicated
to smart card research and applications. Smart cards and secure
elements are the basis for many secure systems and play a decisive
role in ID management. Established computer science areas like
hardware design, operating systems, system modeling, cryptography,
verification and networking got adapted to this fast growing
technology and investigate emerging issues resulting from it. Unlike
events devoted to commercial and application aspects of smart cards,
CARDIS conferences gather researchers and technologists who focus on
all aspects of the design, development, deployment, validation and
application of smart cards and secure elements in secure platforms or
systems.

The eleventh Smart Card Research and Advanced Application IFIP
Conference, organized by the Institute for Applied Information
Processing and Communications (IAIK), Graz University of Technology,
will be held in the Weitzer Hotel, Graz, Austria.
The program committee is seeking original papers on all aspects of
smart cards and secure elements. Submissions across a broad range of
the development phases are encouraged, from exploratory research and
proof-of-concept studies to practical applications and deployment of
smart cards and related technologies. Topics of interest include, but
are not limited to:
– Software for secure embedded systems (operating systems, virtual
machines, … )
– Hardware architectures for secure embedded systems
– Security of RFID systems and sensor nodes
– Security of mobile devices and applications
– Efficient and secure implementations of cryptographic algorithms
– Cryptographic protocols for embedded systems
– Physical attacks and countermeasures
– Secure applications for embedded systems
– Embedded systems networking
– Person representation in embedded systems
– Formal modeling and formal proofs
– Validation and certification of embedded systems and applications
– Identity, privacy and trust issues

Authors are invited to submit papers (PDF or PS format) with novel
contributions electronically using the submission form available on
the following web site:
http://www.easychair.org/conferences/?conf=cardis2012.
Submitted papers must be original, unpublished, anonymous and not
submitted to journals or other conferences/workshops that have
proceedings. Submissions must be written in English and should be at
most 15 pages in total. Papers not meeting these guidelines risk
rejection without consideration. All submissions will be
blind-refereed.

Submission implies the willingness of at least one of the authors to
register and present the paper. The proceedings will be published in
the Springer Lecture Notes in Computer Science (LNCS) series. Accepted
papers should follow the LNCS default author instructions at
http://www.springer.de/comp/lncs/authors.html.

Important dates
—————

Submission of papers: August 20th, 2012, 23:59 GMT+02
Notification of acceptance: October 15, 2012
Camera-ready version of papers for pre-proceedings: November 7, 2012
Workshop date: November 28–30, 2012
Final version of papers: December 17, 2012

Program Committee
—————–
N. Asokan,  Nokia Research Center, Finland
Gildas Avoine,  UCL, Belgium
Chetali Boutheina,  Trusted Labs, France
Josep Domingo Ferrer,  Rovari i Virgili University, Catalonia
Hermann Drexler,  Giesecke & Devrient, Germany
Martin Feldhofer,  NXP, Austria
Berndt Gammel,  Infineon, Germany
Tim Güneysu,  Ruhr-University Bochum, Germany
Helena Handschuh,  Cryptography Research Inc., USA and KU Leuven, Belgium
Michael Hutter,  TU Graz, Austria
Marc Joye,  Technicolor, France
Ioannis Krontiris,  Göthe Universität Frankfurt, Germany
Jean-Louis Lanet,  University of Limoges, France
Konstantinos Markantonakis,  Royal Holloway, UK
Andrew Martin,  University of Oxford, UK
David Naccache,  ENS, France
Elisabeth Oswald,  University of Bristol, UK
Catuscia Palamidessi,  INRIA, France
Eric Peeters,  Texas Instruments, USA
Erik Poll,  RU Nijmegen, Netherlands
Bart Preneel,  KU Leuven, Belgium
Emmanuel Prouff,  ANSSI, France
Matthieu Rivain,  CryptoExperts, France
Pankaj Rohatgi,  Cryptography Research, USA
Ahmad-Reza Sadeghi,  TU Darmstadt, Germany
Jean-Pierre Seifert,  TU Berlin, Germany
Sergei Skorobogatov,  Cambridge University, UK
François-Xavier Standaert,  UCL, Belgium
Frederic Stumpf,  Fraunhofer AISEC, Germany
Marc Witteman,  Riscure, Netherlands

Organizational Committee
————————
Stefan Mangard
(Program Chair)
Infineon Technologies, Germany
Email: Stefan.Mangard AT infineon.com

Jörn-Marc Schmidt
(General Chair)
Graz University of Technology, Austria
Email: joern-marc.schmidt AT iaik.tugraz.at

Jean-Jacques Quisquater
(Publicity Chair)
Université catholique de Louvain, Belgium
Email: jjq AT uclouvain.be

Jul 30

COSADE 2013

+——————————————————————————–+
!
!                                COSADE 2013
!             Fourth International Workshop on Constructive
!                 Side-Channel Analysis and Secure Design
!                              Paris, France
!                             7-8 March 2013
!
!                          http://www.cosade.org
!
+——————————————————————————-+

Important Dates
===============

Abstract submission     24 September
Paper submission         01 October
Notification                   03 December
Final version                 17 December
Workshop                   7-8 March

Background, aim and scope
=========================

Side-channel analysis (SCA) and implementation attacks have become an
important field of research at universities and in the industry. In
order to enhance the resistance of cryptographic and security critical
implementations within the design phase, constructive attacks and
analyzing techniques may serve as a quality metric to optimize the
design and development process. Since 2010, COSADE provides an
international platform for researchers, academics, and industry
participants to present their work and their current research topics.
It is an excellent opportunity to exchange on new results with
international experts and to initiate new collaborations and
information exchange at a professional level. The workshop will
feature both invited presentations and contributed talks.

The fourth International Workshop on Constructive Side-Channel
Analysis and Secure Design will be organized and held by Telecom
ParisTech, Paris, France.

The topics of COSADE 2013 include, but are not limited to:

– Constructive side-channel analysis and implementation attacks
– Semi-invasive, invasive and fault attacks
– Leakage models and security models for side-channel analysis
– Cache-attacks and micro-architectural analysis
– Decapsulation and preparation techniques
– Side-channel based reverse engineering
– Leakage Resilient Implementations
– Evaluation methodologies for side-channel resistant designs
– Secure designs and countermeasures
– Evaluation platforms and tools for testing side-channel characteristics

Submission
==========

Submitted papers should present novel contributions related to the
topics listed above. They must be original, unpublished, anonymous and
not submitted to another conference or journal for consideration of
publication. Papers must be written in English and they should not
exceed 15 pages. Submissions not meeting these guidelines risk
rejection without consideration of their merits. All submissions will
be blind-refereed. Authors are invited to submit their manuscripts
(PDF or PS format) by filling in the submission form available on the
following web site:
http://www.easychair.org/conferences/?conf=cosade2013.

Submission implies the willingness of at least one of the authors to
register and present the paper.

Publication
===========

The proceedings will be published as a Springer Lecture Notes in
Computer Science volume.

Steering committee
==================
Sorin Huss, Technische Universität Darmstadt, Germany
Werner Schindler, Bundesamt für Sicherheit in der Informationstechnik
(BSI), Germany

Conference Chair
================
Jean-Luc Danger, TELECOM ParisTech, France

Conference Chair
================
Emmanuel Prouff, ANSSI, France

Program committee
=================
Dakshi            Agrawal            IBM, USA
Guido              Bertoni             ST Microelectronics, Italy
Ray                 Cheung            City University of Hong Kong, Hong Kong
Jean-Sébastien Coron              Tranef, France
Markus            Dichtl               Siemens AG, Germany
Hermann          Drexler             Giesecke & Devrient, Germany
Benoit              Feix                Inside, France
Catherine         Gebotys           University of Waterloo, Canada
Benedikt          Gierlichs           K.U.Leuven, Belgium
Chirstophe       Giraud              Oberthur Technologies, France
Sylvain             Guilley             Télécom ParisTech, France
Naofumi           Homma            Tohoku University, Japan
Ilya                  Kizhvatov          Riscure, The Netherlands
Markus            Kuhn                University of Cambridge, UK
Victor               Lomné             ANSSI, France
Stefan              Mangard           Infineon, Germany
Amir                 Moradi             Ruhr-Universität Bochum, Germany
Debdeep           Mukhopadhyay Indian Institute of Technology Kharagpur, India
Elisabeth          Oswald             University of Bristol, UK
Axel                 Poschman        Nanyang Technological University, Singapore
Anand              Rajan               Intel Corporation, USA
Matthieu           Rivain              CryptoExperts, France
Kazuo              Sakiyama        The University of
Electro-Communications Tokyo, Japan
Akashi             Satoh              RCIS, Japan
Patrick             Schaumont      Virginia Tech, Blacksburg, USA
Jorn-Marc        Schmidt           IAIK Graz, Austria
François-Xavier Standaert         UCL, Belgium
Hugues            Thiebeauld       RFI Global, UK
Mathias            Wagner           NXP, Germany

Jul 04

Sécuriser une communication VOIP avec ZRTP | Reflets

Sécuriser une communication VOIP avec ZRTP | Reflets.

Jul 02

TextSecure Beta – Android Apps on Google Play

TextSecure is a security enhanced text messaging application that serves as a full replacement for the default text messaging application. Messages to other TextSecure users are encrypted over the air, and all text messages are stored in an encrypted database on the device. If your phone is lost or stolen, your messages will be safe, and communication with other TextSecure users can’t be monitored over the air.

Untap your phone!

TextSecure Beta – Android Apps on Google Play.

Jun 26

CCS 2013 : ACM Conference on Computer and Communications Security

When Nov 4, 2013 – Nov 8, 2013
Where Berlin, Germany
Submission Deadline TBD

CCS 2013 : ACM Conference on Computer and Communications Security.

Jun 24

4th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2012)

4th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2012)

Security and Privacy Track

http://2012.cloudcom.org

The Grand Hotel, Taipei, Taiwan, December 03-06, 2012

===================

Important Dates:

===================

Abstract Submission (obligatory): July 13, 2012

Full Submission: July 27, 2012

Notification: Sep. 7, 2012

Camera-ready & Author registration: Sep. 28, 2012

Poster and Demo: Sep. 10, 2012

Poster and Demo Notification: Sep. 20, 2012

==========

Topics:

==========

*Accountability

*Audit in clouds

*Authentication and authorization

*Cryptographic primitives

*Reliability and availability

*Trust and credential management

*Usability and security

*Security and privacy in clouds

*Legacy systems migration

*Cloud Integrity and Binding Issues

====================

Chairs

====================

Siani Pearson, HP Cloud & Security Research Lab, UK

Jianying Zhou, Inst. Info. Research, Singapore

=================

Program Committee

=================

Man Ho Au, University of Wollongong, Australia

Khin Mi Mi Aung, Data Storage Institute, Singapore

David Chadwick, University of Kent, UK

Andrew Charlesworth, Bristol University, UK

Sherman S. M. Chow, University of Waterloo, Canada

Cheng-Kang Chu, Institute for Infocomm Research, Singapore

Yuri Demchenko, University of Amsterdam, The Netherlands

Josep Ferrer-Gomila, UIB, Spain

Martin Gilje Jaatun, SINTEF, Norway

Sokratis Katsikas, University of Piraeus, Greece

Costas Lambrinoudakis, University of Piraeus, Greece

Fang-Yie Leu, Tunghai university, Taiwan

Hui Li, Xidian University, China

Yingjiu Li, Singapore Management University, Singapore

Chu-Hsing Lin, Tunghai university, Taiwan

Joseph Liu, Institute for Infocomm Research, Singapore

Javier Lopez, University of Malaga, Spain

Olivier Markowitch, Universite Libre de Bruzelles

Stephen Marsh, Communications Research Centre Canada

Al-Sakib Khan Pathan, IIUM, Malaysia

Christoph Reich, Hochschule Furtwangen University, Germany

Chunming Rong, University of Stavanger, Norway

Kouichi Sakurai, Kyushu University, Japan

Pierangela Samarati, Universita’ degli Studi di Milano, Italy

Qiang Tang, University of Twente, Netherlands

Lingyu Wang, Concordia University, Canada

Tzong-Chen Wu, NTUST, Taiwan

Li Xu, Fujian Normal University, China

George Yee, Carleton University & Office of the Privacy Commissioner of Canada, Canada

Tsz Hon Yuen, The University of Hong Kong, China

Yongbin Zhou, Institute of Information Engineering, China

Wolfgang Ziegler, Fraunhofer Institute, Germany

=================

Special Issues

=================

Best Paper Awards will be presented to high quality papers.

Selected papers, after further extensions and revisions, will be published in special issues of the following prestigious journals

Future Generation Computer Systems (Elsevier) (ISI Impact Factor = 2.365)

International Journal of Communication Systems (Wiley) (ISI Impact Factor = 0.229)

Journal of Systems Architecture (Elsevier) (ISI Impact Factor = 0.768)

Automated Software Engineering (Springer) (ISI Impact Factor = 0.806)

Journal of Internet Technology (ISI Impact Factor = 0.448)

Information System Frontier (Springer) (ISI Impact Factor = 1.596)

International Journal of Grid and High-Performance Computing (Scopus, EI)

===========================

Submission & Publication

===========================

Papers need to be prepared according to the IEEE CS format, and submitted in PDF format via the EasyChair system

https://www.easychair.org/account/signin.cgi?conf=ieeecloudcom2012

Accepted conference papers will be published by IEEE CS Press (IEEE-DL & EI indexed).