Tag: cryptography

May 14

Journal of Information Security

You are cordially invited to submit a manuscript to the Journal of Information Security (JIS, ISSN:2153-1242), published by Scientific Research Publishing (SCIRP).It is an international peer-reviewed open access journal devoted to publication of original contributions in relevant areas of information security.

 

Being an open access journal we offer the following advantages:

  • Researchers around the world have full access to all the published articles
  • Widest dissemination of your published work ensuring greater visibility
  • Free downloads of the published articles without any subscription fee

 

The journal of JIS has a distinguished editorial board ensuring that it maintains high scientific standards with a broad international coverage. To view a list of the journal’s editors please visitwww.scirp.org/journal/jis.

Aims & Scope of the journal include:

  • Access Control
  • Anti-Virus and Anti-Worms
  • Authentication and Authorization
  • Biometric Security
  • Cryptography
  • Data and System Integrity
  • Database Security
  • Distributed Systems Security
  • Electronic Commerce Security
  • Fraud Control
  • Grid Security
  • Information Hiding and Watermarking
  • Information Privacy
  • Information Security Engineering
  • Intellectual Property Protection
  • Intrusion Detection
  • Key Management and Key Recovery
  • Language-based Security
  • Network Security
  • Operating System Security
  • Risk Evaluation and Security Certification
  • Security for Mobile Computing
  • Security Models
  • Security Protocols
  • Security and Privacy for Social Computing
  • Security Evaluation
  • Signature and Key Agreement Protocol
  • Software Security
  • System Security
  • Trusted Computing and Trustworthy Computing Technology

Please read over the journal’s Author Guidelines for more information on the journal’s policies and the submission process. Once a manuscript has been accepted for publication, it will undergo language copyediting, typesetting, and reference validation in order to ensure the highest quality of publication quality.

Please do not hesitate to contact me if you have any questions about the journal.

Best regards,

Prof. Gyungho Lee
Editor in Chief
eic.jis@scirp.org

JIS Editorial Office
Scientific Research Publishing

May 14

Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2012)

FDTC 2012: Call for Papers
==========================
www.fdtc-workshop.eu

The 9th Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC
2012) will be held in Leuven, Belgium, on September 9, 2012. FDTC 2012
is one day before CHES 2012 (September 10-12, 2012). This Call for
Papers is also available for download as a PDF file
(http://conferenze.dei.polimi.it/FDTC12/cfp.pdf).

Motivation & Scope
==================

Fault injection is one of the most exploited means for extracting
confidential information from embedded devices or for compromising their
intended behavior. Research is therefore needed to develop methodologies
and techniques for designing robust cryptographic systems (both hardware
and software), and to protect them against both accidental faults and
intentional intrusions and attacks. Of particular interest is protection
against malicious injection of faults into the device for the purpose of
extracting confidential information.
FDTC is the reference event in the field of fault analysis, attacks and
countermeasures.

Important dates
===============

Extended submission deadline: May 18, 2012, 23:59 UTC
Notification of acceptance:  June 18, 2012
Final version deadline:       July 2, 2012
Workshop:                September 9, 2012

Paper submission
================

Contributions to the workshop describing theoretical studies and
practical case studies of fault diagnosis and tolerance in cryptographic
systems (HW and SW) and protocols are solicited. Topics of interest
include, but are not limited to:

– modelling the reliability of cryptographic systems and protocols
– inherently reliable cryptographic systems and algorithms
– faults and fault models for cryptographic devices (HW and SW)
– novel fault diagnosis and tolerance techniques for cryptographic systems
– attacks exploiting micro-architecture components
– physical protection against attacks
– fault attacks using lasers, electromagnetic induction, and clock /
power supply manipulation
– case studies of attacks, reliability, and fault diagnosis and
tolerance techniques in cryptographic systems
– combined attacks
– fault injection: mechanisms, models and countermeasures
– fault exploitation: analysis, attacks and countermeasures
– fault resistant hardware, fault resistant implementations of
cryptographic algorithms and fault resistant protocols

All submissions should be made using the online submission system:

http://fdtc.ws.dei.polimi.it

Submissions should conform to the instructions below.

Instructions for authors
========================

Submissions must not substantially duplicate work that any of the
authors have published elsewhere or that have been submitted in parallel
in any other conference or workshop. Submissions should be anonymous,
with no author names, affiliations, acknowledgements or obvious
references. Papers should be at most 10 pages (including the
bibliography and appendices), with at least 11pt font and reasonable
margins.

Submission of final papers will be managed directly by Conference
Publishing Services (CPS). Final papers must be formatted following the
instructions in the related author kit (to be communicated). Conference
Publishing Services (CPS) will contact directly the authors for
instructions and will send links to the publishing services.

Accepted papers will be published in an archival proceedings volume by
Conference Publishing Services (CPS) and will be distributed at the time
of the workshop.

At least one author of each accepted paper must register with the
workshop and present the paper in order to be included in the proceedings.

Program committee
=================

Alessandro Barenghi, Politecnico di Milano, Italy
Guido Bertoni, STMicroelectornics, Italy (co-chair)
Christophe Clavier, University of Limoges, France
Wieland Fischer, Infineon Technologies, Germany
Benedikt Gierlichs, KU Leuven, Belgium (co-chair)
Christophe Giraud, Oberthur Technologies, France
Jorge Guarjardo, Bosch, USA
Sylvain Guilley, Telecom ParisTech, France
Helena Handschuh, Intrinsic-ID Inc., USA
Dusko Karaklajic, KU Leuven, Belgium
Kerstin Lemke-Rust, HBRS, Germany
Marcel Medwed, UCL Crypto Group, Belgium
Debdeep Mukhopadhyay, Indian Institute of Technology Kharagpur, India
Matthieu Rivain, CryptoExperts, France
Jörn-Marc Schmidt, TU Graz, Austria
Sergei Skorobogatov, University of Cambridge, UK
Junko Takahashi, NTT Corporation, Japan
Michael Tunstall, University of Bristol, UK
Marc Witteman, Riscure, The Netherlands

Contact with the PC co-chairs is pc2012@fdtc-workshop.eu
========================================================

Steering committee
==================

Luca Breveglieri, Politecnico di Milano, Italy
Israel Koren, University of Massachusetts, USA
David Naccache (chair), Ecole Normale Supérieure, France
Jean-Pierre Seifert, TU Berlin & T-Labs, Germany

FDTC 2012 is in cooperation with IACR – http://www.iacr.org

Apr 22

9th Workshop on Fault Diagnosis and Tolerance in Cryptography

FDTC 2012: Call for Papers
==========================
www.fdtc-workshop.eu

The 9th Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC
2012) will be held in Leuven, Belgium, on September 9, 2012. FDTC 2012
is one day before CHES 2012 (September 10-12, 2012). This Call for
Papers is also available for download as a PDF file
(http://conferenze.dei.polimi.it/FDTC12/cfp.pdf).

Motivation & Scope
==================

Fault injection is one of the most exploited means for extracting
confidential information from embedded devices or for compromising their
intended behavior. Research is therefore needed to develop methodologies
and techniques for designing robust cryptographic systems (both hardware
and software), and to protect them against both accidental faults and
intentional intrusions and attacks. Of particular interest is protection
against malicious injection of faults into the device for the purpose of
extracting confidential information.
FDTC is the reference event in the field of fault analysis, attacks and
countermeasures.

Important dates
===============

Paper submission deadline:    May 10, 2012, 23:59 UTC
Notification of acceptance:  June 18, 2012
Final version deadline:       July 2, 2012
Workshop:                September 9, 2012

Paper submission
================

Contributions to the workshop describing theoretical studies and
practical case studies of fault diagnosis and tolerance in cryptographic
systems (HW and SW) and protocols are solicited. Topics of interest
include, but are not limited to:

– modelling the reliability of cryptographic systems and protocols
– inherently reliable cryptographic systems and algorithms
– faults and fault models for cryptographic devices (HW and SW)
– novel fault diagnosis and tolerance techniques for cryptographic systems
– attacks exploiting micro-architecture components
– physical protection against attacks
– fault attacks using lasers, electromagnetic induction, and clock /
power supply manipulation
– case studies of attacks, reliability, and fault diagnosis and
tolerance techniques in cryptographic systems
– combined attacks
– fault injection: mechanisms, models and countermeasures
– fault exploitation: analysis, attacks and countermeasures
– fault resistant hardware, fault resistant implementations of
cryptographic algorithms and fault resistant protocols

All submissions should be made using the online submission system:

http://fdtc.ws.dei.polimi.it

Submissions should conform to the instructions below.

Instructions for authors
========================

Submissions must not substantially duplicate work that any of the
authors have published elsewhere or that have been submitted in parallel
in any other conference or workshop. Submissions should be anonymous,
with no author names, affiliations, acknowledgements or obvious
references. Papers should be at most 10 pages (including the
bibliography and appendices), with at least 11pt font and reasonable
margins.

Submission of final papers will be managed directly by Conference
Publishing Services (CPS). Final papers must be formatted following the
instructions in the related author kit (to be communicated). Conference
Publishing Services (CPS) will contact directly the authors for
instructions and will send links to the publishing services.

Accepted papers will be published in an archival proceedings volume by
Conference Publishing Services (CPS) and will be distributed at the time
of the workshop.

At least one author of each accepted paper must register with the
workshop and present the paper in order to be included in the proceedings.

Program committee
=================

Alessandro Barenghi, Politecnico di Milano, Italy
Guido Bertoni, STMicroelectornics, Italy (co-chair)
Christophe Clavier, University of Limoges, France
Wieland Fischer, Infineon Technologies, Germany
Benedikt Gierlichs, KU Leuven, Belgium (co-chair)
Christophe Giraud, Oberthur Technologies, France
Jorge Guarjardo, Bosch, USA
Sylvain Guilley, Telecom ParisTech, France
Helena Handschuh, Intrinsic-ID Inc., USA
Dusko Karaklajic, KU Leuven, Belgium
Kerstin Lemke-Rust, HBRS, Germany
Marcel Medwed, UCL Crypto Group, Belgium
Debdeep Mukhopadhyay, Indian Institute of Technology Kharagpur, India
Matthieu Rivain, CryptoExperts, France
Jörn-Marc Schmidt, TU Graz, Austria
Sergei Skorobogatov, University of Cambridge, UK
Junko Takahashi, NTT Corporation, Japan
Michael Tunstall, University of Bristol, UK
Marc Witteman, Riscure, The Netherlands

Contact with the PC co-chairs is pc2012@fdtc-workshop.eu
========================================================

Steering committee
==================

Luca Breveglieri, Politecnico di Milano, Italy
Israel Koren, University of Massachusetts, USA
David Naccache (chair), Ecole Normale Supérieure, France
Jean-Pierre Seifert, TU Berlin & T-Labs, Germany

FDTC 2012 is in cooperation with IACR – http://www.iacr.org

Apr 18

8th International Workshop on Security and Trust Management (STM 2012)

CALL FOR PAPERS
8th International Workshop on Security and Trust Management (STM 2012)
in conjunction with ESORICS 2012
Pisa, Italy – September 13-14, 2012

STM (Security and Trust Management) is a working group of ERCIM
(European Research Consortium in Informatics and Mathematics). STM
2012 is the eighth workshop in this series and will be held in Pisa,
Italy, in conjunction with the 17th European Symposium on Research in
Computer Security (ESORICS 2012).  The workshop seeks submissions from
academia, industry, and government presenting novel research on all
theoretical and practical aspects of security and trust in ICTs.
Topics of interest include, but are not limited to:

– Access control
– Anonymity
– Applied cryptography
– Authentication
– Complex systems security
– Data and application security
– Data protection
– Data/system integrity
– Digital right management
– Economics of security and privacy
– E-services
– Formal methods for security and trust
– Identity management
– Legal and ethical issues
– Networked systems security
– Operating systems security
– Privacy
– Security and trust metrics
– Security and trust policies
– Security and trust management architectures
– Security and trust in cloud environments
– Security and trust in grid computing
– Security and trust in pervasive computing
– Security and trust in social networks
– Social implications of security and trust
– Trust assessment and negotiation
– Trust in mobile code
– Trust models
– Trust management policies
– Trust and reputation systems
– Trusted platforms
– Trustworthy systems and user devices
– Web services security

SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. All submissions should be appropriately
anonymized (i.e., papers should not contain author names or
affiliations, or obvious citations). Submissions should be at most 16
pages, including the bibliography and well-marked appendices, and
should follow the LNCS style. Submissions are to be made to the
submission web site at (to be announced). Only pdf files will be
accepted. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Papers must be received by the
deadline of May 25, 2012 ({11:59 p.m. American Samoa time}).  Authors
of accepted papers must guarantee that their papers will be presented
at the workshop. Pre-proceedings will be made available at the
workshop.  As for previous STM events, it is planned to have
post-proceedings published by Springer in the Lecture Notes in
Computer Science (LNCS) series.

IMPORTANT DATES
Paper submission due: May 25, 2012
Notification to authors: July 15, 2012
Camera ready due: August 1, 2012

GENERAL CHAIR
Marinella Petrocchi
CNR, Italy

PROGRAM CHAIRS
Audun Josang
University of Oslo, Norway

Pierangela Samarati
Universita’ degli Studi di Milano, Italy

PUBLICITY CHAIR
Giovanni Livraga
Universita’ degli Studi di Milano, Italy

PROGRAM COMMITTEE
Rafael Accorsi, University of Freiburg, Germany
Rose-Mharie Åhlfeldt, University of Skövde, Sweden
Alessandro Armando, Universita’ degli Studi di Genova, Italy
Gilles Barthe, IMDEA Software, Spain
Jason Crampton, Royal Holloway University of London, UK
Naranker Dulay, Imperial College London, UK
Mathias    Ekstedt, KTH Royal Institute of Technology, Sweden
Carmen Fernández-Gago, University of Málaga, Spain
Sara Foresti, Universita’ degli Studi di Milano, Italy
Jochen Haller, SAP Research, Germany
Michael Huth, Imperial College London, UK
Sushil Jajodia, George Mason University, USA
Christian Jensen, Technical University of Denmark, Denmark
Henrik Johnsson, Blekinge Institute of Technology, Sweden
Lalana Kagal, MIT, USA
Guenter Karjoth, IBM Research, Switzerland
Stewart Kowalski, Stokholm University, Sweden
Giovanni Livraga, Universita’ degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Fabio Martinelli, CNR, Italy
Sjouke Mauw, University of Luxembourg, Luxembourg
Catherine Meadows, US Naval Research Laboratory, USA
Stig Mjølsnes, Norwegian University of Science and Technology, Norway
Simin Nadjm-Tehrani, Linköpings University, Sweden
Masakatsu Nishigaki, Shizuoka University, Japan
Marina Papatriantafilou, Chalmers University of Technology, Sweden
Guenter Pernul, University of Regensburg, Germany
Walter Quattrociocchi, CNR, Italy
Silvio Ranise, Fondazione Bruno Kessler, Italy
Ketil Stolen, University of Oslo, Norway
Vipin Swarup, The MITRE Corporation, USA
Sotirios Terzis, University of Strathclyde, UK
Mahesh Tripunitara, University of Waterloo, Canada

Conference web page http://stm2012.dti.unimi.it
PC chairs email: tm2012@unimi.it

Apr 11

IEEE Transactions on Information Forensics and Security Special Issue on Privacy and Trust Management in Cloud and Distributed Systems

CALL FOR PAPERS

IEEE Transactions on Information Forensics and Security

Special Issue on Privacy and Trust Management in Cloud and Distributed Systems

 

Guest Editors

Karl Aberer – École Polytechnique Fédérale de Lausanne, Switzerland (karl.aberer@epfl.ch)
Sen-ching Samson Cheung – University of Kentucky, USA (cheung@engr.uky.edu)
Jayant Haritsa – Indian Institute of Science, India (jharitsa@gmail.com)
Bill Horne – Hewlett-Packard Laboratories, USA (william.horne@hp.com)
Kai Hwang – University of Southern California, USA (kaihwang@usc.edu)
Yan (Lindsay) Sun – University of Rhode Island, USA (yansun@ele.uri.edu)

With the increasing drive towards availability of data and services anytime anywhere, privacy risks have significantly increased. Unauthorized disclosure, modification, usage, or uncontrolled access to privacy-sensitive data may result in high human and financial costs. In the distributed computing environments, trust plays a crucial role in mitigating the privacy risk by guaranteeing meaningful interactions, data sharing, and communications. Trust management is a key enabling technology for security and privacy enhancement. While privacy preservation and trust management are already challenging problems, it is imperative to explore how privacy-oriented and trust-oriented approaches can integrate to bring new solutions in safeguarding information sharing and protecting critical cyber infrastructure. Furthermore, there are questions about whether existing trust models and privacy preserving schemes are robust against attacks. This Call for Papers invites researchers to contribute original articles that cover a broad range of topics related to privacy preservation and trust management in cloud and distributed systems, with a focus on emerging networking contexts such as social media, cloud computing, and power grid systems.

 

Example topics include but are not limited to

  • Privacy Enhanced Technology: privacy preserving data mining, publishing, and disclosure; access control, anonymity, audit, and authentication; applied cryptography, cryptanalysis, and digital signatures in PET; abuse cases and threat modeling; theoretical models and formal methods; application of physical security for privacy enhancement.
  • Trust and Reputation Management: trust management architectures and trust models; quantitative metrics and computation; security of trust management protocols/systems; evaluation and test bed; trust related privacy enhancement solutions.
  • Privacy and Trust in Emerging Complex Systems including: social networking; cloud computing; power grid systems; sensor networks; Internet of Things; multimedia surveillance networks.
  • Other Related Topics such as trust and privacy policies; human factors and usability; censorship; economics of trust and privacy; behavior modeling.

Submission Procedure: Manuscripts are to be submitted according to the Information for Authors at http://www.signalprocessingsociety.org/publications/periodicals/forensics/forensics-authors-info/ using the IEEE online manuscript system, Manuscript Central. Papers must not have appeared or under review elsewhere.

 

Schedule

Submission deadline:                 May 31, 2012

First Review:                            September 12, 2012

Revisions Due:                          October 31, 2012

Final Decision:                           January 15, 2012

Final manuscript due:               February 20, 2013

Tentative publication date:      June 1, 2013

Mar 28

Eight Conference on Security and Cryptography for Networks

===================================================================
SCN 2012

Eight Conference on Security and Cryptography for Networks

September 5-7, 2012, Amalfi, Italy

http://scn.dia.unisa.it/
===================================================================

The Eight Conference on Security and Cryptography for Networks
(SCN 2012) aims at bringing together researchers in the field of
cryptography and information security, practitioners, developers,
and users to foster cooperation, exchange techniques, tools,
experiences and ideas. The conference seeks submissions from
academia, government, and industry presenting novel research on
all practical and theoretical aspects of cryptography and
information security.

The primary focus is on original, high quality, unpublished
research of theoretical and practical impact, including concepts,
techniques, applications and practical experiences.

Submitted papers must not substantially overlap with papers that
have been published or that are simultaneously submitted to a
conference/workshop with proceedings or a journal.

Topics
All topic areas related to cryptography and information security
are of interest and in scope.  Suggested  topics include but are
not restricted to:

Anonymity and Privacy
Applied Cryptography and Implementations
Authentication, Identification and Access Control
Block and Stream Ciphers
Complexity-Theoretic Cryptography
Cloud Computing Security
Cryptanalysis
Cryptographic Hash Functions
Cryptographic and Security Protocols
Digital Signatures and Message Authentication Codes
Distributed Systems Security
Formal Security Methods
Information-Theoretic Security
Network, Web and Wireless Security
Public-Key Encryption
Physical Cryptography
Security Architectures and Models
Software and Systems Security

Submissions
Authors are invited to submit electronically (PDF format) a
non-anonymous extended abstract. The extended abstract should be
typeset using 11-point or larger fonts, in a single-column,
single-spacing format reasonable margins all around. Submissions
deviating significantly from these guidelines risk rejection
without consideration of their merits.

All submissions will be treated as confidential, and will only
be disclosed to the committee and their chosen sub-referees.

The submission should begin with a title, followed by the names,
affiliations and contact information of all authors, and a short
abstract. The length of the submission should be at most 12 pages
excluding the title page, bibliography and appendices. The
extended abstract should clearly indicate the results achieved,
their significance, and their relation to other work in the area.
Referees are not required to read appendices; the paper should be
intelligible without them. Submissions must not substantially
duplicate work that was published elsewhere, or work that any of
the authors has submitted in parallel to a journal or to any
other conference or workshop with proceedings.

Best Paper Award
All submissions are eligible for the Best Paper award. The
committee may decide to split the award between multiple papers,
or to decline to make an award.

Proceedings
Proceedings are expected to be published by Springer in the
Lecture Notes in Computer Science (LNCS) series.  Selected
papers from the conference will be invited to a special issue of
the Journal of Computer Security.

Dates and Deadlines
Submission: 10PM PST, May 3, 2012
Notification to authors: June 15, 2012
Camera-Ready Version: June 27, 2012
Conference: September 5-7, 2012

Presentation
Authors of accepted papers must guarantee that their paper will
be presented at the conference.

Program Chair
Ivan Visconti, University of Salerno, Italy

Program Committee
Masayuki Abe, NTT, Japan
Amos Beimel, Ben-Gurion University, Israel
Carlo Blundo, University of Salerno, Italy
Alexandra Boldyreva, Georgia Institute of Technology, USA
Xavier Boyen, PARC, USA
Dario Catalano, University of Catania, Italy
Melissa Chase, Microsoft Research Redmond, USA
Dana Dachman-Soled, Microsoft Research New England, USA
Stefan Dziembowski, University of Warsaw, Poland and Sapienza University of Rome, Italy
Pierre-Alain Fouque, ENS, France
Juan Garay, AT&T Labs-Research, USA
Vipul Goyal, Microsoft Research, India
Brett Hemenway, University of Michigan, USA
Martin Hirt, ETH Zurich, Switzerland
Dennis Hofheinz, Karlsruhe Institute of Technology, Germany
Stanislaw Jarecki, UCI, USA
Gregory Neven, IBM Research, Switzerland
Carles Padro, Nanyang Technological University, Singapore
Benny Pinkas, Bar Ilan University, Israel, and Google, USA
Bart Preneel, Katholieke Universiteit Leuven, Belgium
Matt Robshaw, Orange Labs, France
Alon Rosen, IDC Herzliya, Israel
abhi shelat, University of Virginia, USA
Francois-Xavier Standaert, UCL, Belgium
Dominique Unruh, University of Tartu, Estonia
Bogdan Warinschi, University of Bristol, UK
Daniel Wichs, IBM Research T.J. Watson, USA
Moti Yung, Google, USA

General Chair
Roberto De Prisco, University of Salerno, Italy

Local Organization
Aniello Castiglione, University of Salerno, Italy
Paolo D’Arco, University of Salerno, Italy

Steering Committee
Carlo Blundo, University of Salerno, Italy
Alfredo De Santis, University di Salerno, Italy
Ueli Maurer, ETH Zurich, Switzerland
Rafail Ostrovsky, UCLA, USA
Giuseppe Persiano, University of Salerno, Italy
Jacques Stern, ENS, France
Douglas Stinson, University of Waterloo, Canada
Gene Tsudik, University of California – Irvine , USA
Moti Yung, Google Inc. and Columbia University, USA
===================================================================

Mar 28

Sixth International Conference “Mathematical Methods, Models, and Architectures for Computer Networks Security”

Sixth International Conference
“Mathematical Methods, Models, and Architectures
for Computer Networks Security”
(MMM-ACNS-2012) and
Second International Workshop
“Scientific Analysis and Policy Support for Cyber Security”
(SA&PS4CS-2012)

October 17-20, 2012, St. Petersburg, Russia

http://comsec.spb.ru/mmm-acns12/
http://www.comsec.spb.ru/saps4cs12/

Main sponsors
1. Office of Naval Research Global, USA
2. European Office of Aerospace Research and Development USAF, USA
3. Russian Foundation for Basic Research

Organizers
* St. Petersburg Institute for Informatics and Automation of the Russian
Academy of Sciences (SPIIRAS)
* Binghamton University (State University of New York)

Title and scope

The previous International Conferences “Mathematical Methods, Models
and Architectures for Computer Networks Security” (MMM-ACNS-2001
(http://space.iias.spb.su/mmm-acns01/), MMM-ACNS-2003
(http://space.iias.spb.su/mmm-acns03/), MMM-ACNS-2005
(http://space.iias.spb.su/mmm-acns05/), MMM-ACNS-2007
(http://www.comsec.spb.ru/mmm-acns07/ and MMM-ACNS-2010
(http://www.comsec.spb.ru/mmm-acns10/)) organized by St. Petersburg
Institute for Informatics and Automation, Binghamton University (SUNY)
and supported by the European Office of Aerospace Research and
Development USAF, Office of Naval Research Global, and Russian
Foundation for Basic Research were successful. These conferences
demonstrated the high interest of the international scientific community
to the theoretical and practical aspects of the computer network and
information security.
The goals of MMM-ACNS-2012 Conference
(http://www.comsec.spb.ru/mmm-acns12/) is to bring together leading
researchers from academia and governmental organizations as well as
practitioners to advance the states of the art and practice in the area
of computer networks and information security with a focus on novel
theoretical aspects of computer network security, facilitate personal
interactions and discussions on various aspects of information
technologies in conjunction with computer network and information
security problems arising in large-scale computer networks.

The MMM-ACNS-2012 Conference will be carried out together with the
Second International Workshop “Scientific Analysis and Policy Support
for Cyber Security” (SA&PS4CS-2012)
(http://www.comsec.spb.ru/saps4cs12/) dedicated to the methods of
scientific analysis and policy support for response to cyber intrusions
and attacks.

Topics of interest

Papers offering novel research contributions to the theoretical
aspects of the computer network and information security are solicited
for submission.
Papers may present theory, technique, and applications on topics
including but not restricted to:
* Adaptive security
* Anti-malware techniques: detection, analysis, prevention
* Anti-phishing, anti-spam, anti-fraud, anti-botnet techniques
* Applied cryptography
* Authentication, authorization and access control
* Cloud Security
* Computer and network forensics
* Covert channels
* Critical infrastructure protection
* Data and application security
* Data mining, machine learning, and bio-inspired approaches for security
* Deception systems and honeypots
* Denial-of-service attacks and countermeasures
* Digital Rights Management
* eCommerce, eBusiness and eGovernment security
* Embedded system security
* Formal analysis of security properties
* Information warfare
* Internet and web security
* Intrusion prevention, detection, and response
* Language-based security
* Network survivability
* New ideas and paradigms for security
* Operating system security
* Reliability and dependability
* Risks metrics, risk analysis and risk management
* Security and privacy in pervasive and ubiquitous computing
* Security event and information management
* Security for large-scale systems and critical infrastructures
* Security in social networks
* Security of emerging technologies: sensor, wireless/mobile,
peer-to-peer and overlay networks
* Security of autonomous agents and multi-agent systems
* Security modeling and simulation
* Security policies
* Security protocols
* Security verification
* Security visualization
* Self-protecting and healing
* Smartphone security
* Software protection
* Trusted computing
* Trust and reputation management
* Vulnerability assessment

The main topics of the SA&PS4CS-2012 are detection, discrimination,
and attribution of various activities of malefactors and response to
cyber intrusions and attacks including national level information
operations as well as identifying emergent cyber technologies supporting
social and political activity management and trans-national distributed
computing management.

Objective of the MMM-ACNS-2012 Conference

The main objectives of the MMM-ACNS-2012 Conference are to discuss
state-of-the-art in mathematical methods and models for computer
networks and information security to promote a better understanding of
recent achievements and trends in the computer network security, as well
as making use of recent achievements in the area of advanced information
technologies for computer network and information assurance.
Security assurance of resident information and computer networks’
software is one of the important problems of the modern computer science
and information technology. The problem importance is confirmed by ever
increasing multiplicity and diversity of threads and vulnerabilities of
computer networks, permanently increasing significance and value of
information itself, and by potentially devastating consequences of
successful attacks on integrity, resource availability and information
confidentiality. Unauthorized access to computer network facilities and
network resources, especially in global networks participating in
real-time control operations, may be truly disastrous.
There are several reasons for the complexity of the problem under
study. The growing size of the network, its interconnectivity, large
number of users, increasing number of vulnerable targets within the
network (communication protocols, operating systems, servers,
applications, etc.), and the appearance of effective and previously
unknown types of attacks are among them.
An additional objective of the conference is to bring together
researchers and developers from academia, industry and governmental
organizations to exchange ideas in a broad range of topics among
researchers, security system developers and users from research and
commercial perspective.
Since the scope of the conference covers areas presenting specific
interest for basic and applied research organizations, information about
the conference will be distributed among the corresponding organizations
in Russia and worldwide. So far preliminary agreement to participate in
the conference is received from leading Russian Institutions doing basic
and applied research in Computer Science, Telecommunication and Computer
Security and from companies developing relevant industrial applications.

Objective of the SA&PS4CS-2012 Workshop

The Workshop is dedicated to the methods of scientific analysis and
policy support for response to cyber intrusions and attacks. The main
topics of the Workshop are detection, discrimination, and attribution of
various activities of malefactors and response to cyber intrusions and
attacks including national level information operations as well as
identifying emergent cyber technologies supporting social and political
activity management and trans-national distributed computing management.
The Workshop aims to bring together researchers and practitioners
involved in multiple disciplines concerning scientific analysis and
policy support for cyber security to exchange ideas and to learn the
latest developments in this important field.
This Workshop could promote internationally shared understanding of
the technically supportable indications and warnings for various types
of intrusions and attacks, from the isolated to the highly coordinated,
and from the forensic to strategic.
The Workshop is planned on the last day of MMM-ACNS-2012.

Submitting a paper

The MMM-ACNS-2012 welcomes original papers from academic, government,
and industry contributors on mathematical approaches and models,
state-of-the-art techniques, and novel applications in the above
proposed areas. All submissions will be subjected to a thorough review
by at least three reviewers.
Draft versions of original full papers up to 14 A4 pages (but not
less than 6 pages) in English prepared according to the instructions
provided by Springer (http://www.springer.com/comp/lncs/Authors.html),
including abstract (up to 300 words) and keywords (5 to 8), should be
submitted by
May 27, 2012
or sooner through the upload facilities at the MMM-ACNS-2012 web site
http://www.comsec.spb.ru/mmm-acns12/ .
Only electronic submissions in PDF format will be considered.
Authors must also indicate the conference track to which the paper is
submitted.
The Program Committee will make the final selection based on peer
reviewers’ evaluation.
The primary focus is on high-quality original unpublished research,
case studies and implementation experiences.
Notification of acceptance/rejection will be disseminated by June 29,
2012.
Camera-ready versions of accepted papers (see below) are due July 11,
2012.

The speakers of the SA&PS4CS-2012 Workshop will be personally
invited. We intend to invite for participation in the session a number
of worldwide recognized specialists in cyber security from the USA,
Europe, China, Russia and other countries.

Proceedings

Program Committee plans to publish the MMM-ACNS-2012 Proceedings in
Springer series “Lecture Notes in Computer Science” (LNCS). The final
decision will be made by Springer after finalizing the reviewing
process. Instructions for authors will be provided at the MMM-ACNS-2012
web site (http://www.comsec.spb.ru/mmm-acns12/).
Camera ready paper submission can be uploaded through the
MMM-ACNS-2012 web site at http://www.comsec.spb.ru/mmm-acns12/.

The Proceeding of the SA&PS4CS-2012 Workshop also will be prepared.

Conference Languages

The working language of MMM-ACNS-2012 is English.

The working languages of SA&PS4CS-2012 Workshop are English and
Russian. Presentations will be simultaneously translated.

Location of the Conference and Workshop

According to the preliminary agreement, the MMM-ACNS-2012 conference
and the SA&PS4CS-2012 Workshop will take place in the historical
building “Palace of Grand Prince Vladimir Romanov,” now “House of
Scientists,” located in the heart of St. Petersburg, address: 26,
Dvortsovaya emb., St.Petersburg, 191186, Russia.
This venue allows the conference organizers to arrange for the
conference itself, as well as for the associated events (informal
discussions, reception, breaks, etc.).

Contact us

Program Committee Co-Chairman
Prof. Igor Kotenko
Head of Laboratory of Computer Security Problems
St. Petersburg Institute for Informatics and Automation
of the Russian Academy of Sciences
39, 14th Liniya, St. Petersburg, 199178, Russia
Telephone: +7-(812)-328-2642
Fax: +7-(812)-328-4450
E-mail:  mmmacns[AT]comsec[DOT]spb[DOT]ru

Local contact person
Irina Podnozova
Phone: 7-(812)-328-4446   Fax:  +7(812)-328-06-85
E-mail: ipp[AT]mail[DOT]iias[DOT]spb[DOT]su

Mar 28

ESORICS 2012 : Deadline extended

*** Deadline extended to April 10, 2012 ***

CALL FOR PAPERS

******************************************************************************
17th European Symposium on Research in Computer Security (ESORICS 2012)
Pisa, Italy — September 10-12, 2012
http://www.iit.cnr.it/esorics2012/
******************************************************************************

ESORICS is the annual European research event in Computer Security.
The Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the academic
and industrial communities.  Papers offering novel research contributions
in computer security are solicited for submission to the Symposium.
The primary focus is on original, high quality, unpublished research
and implementation experiences. We encourage submissions of
papers discussing industrial research and development.
Topics of interest include, but are not limited to:

– access control
– accountability
– ad hoc networks
– anonymity
– applied cryptography
– authentication
– biometrics
– database security
– data protection
– digital content protection
– digital forensic
– distributed systems security
– electronic payments
– embedded systems security
– inference control
– information hiding
– identity management
– information flow control
– integrity
– intrusion detection
– formal security methods
– language-based security
– network security
– phishing and spam prevention
– privacy
– risk analysis and management
– secure electronic voting
– security architectures
– security economics
– security metrics
– security models
– security and privacy in cloud scenarios
– security and privacy in complex systems
– security and privacy in location services
– security and privacy for mobile code
– security and privacy in pervasive/ubiquitous computing
– security and privacy policies
– security and privacy in social networks
– security and privacy in web services
– security verification
– software security
– steganography
– systems security
– trust models and management
– trustworthy user devices
– web security
– wireless security

PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. The proceedings will be published by
Springer in the the Lecture Notes in Computer Science series.
All submissions should follow the LNCS template
(http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0)
from the time they are submitted. Submitted papers should be
at most 16 pages (using 10-point font), excluding the bibliography and
well-marked appendices, and at most 20 pages total. Committee members
are not required to read the appendices, so the paper should be
intelligible without them. All submissions must be written in English.
Submissions are to be made to the submission web site at
http://www.easychair.org/conferences/?conf=esorics2012.
Only pdf files will be accepted. Submissions not meeting these guidelines
risk rejection without consideration of their merits.
Papers must be received by the deadline of April 10, 2012 (11:59 p.m.
American Samoa time). Authors of accepted papers must guarantee that
their papers will be presented at the conference.

IMPORTANT DATES
Paper submission due: April 10, 2012 (11:59 p.m. American Samoa time) [extended]
Notification to authors: June 10, 2012
Camera ready due: June 20, 2012

GENERAL CHAIR
Fabio Martinelli
National Research Council – CNR, Italy

PROGRAM CHAIRS
Sara Foresti
Universita` degli Studi di Milano, Italy

Moti Yung
Google Inc.,  USA

PUBLICITY CHAIR
Giovanni Livraga
Universita` degli Studi di Milano, Italy

PROGRAM COMMITTEE
Alessandro Armando, Universita` di Genova, Italy
Mikhail Atallah, Purdue University, USA
Michael Backes, Saarland University, Germany
David A. Basin, ETH Zurich, Switzerland
Kevin Bauer, University of Waterloo, Canada
Joachim Biskup, University of Dortmund, Germany
Marina Blanton, University of Notre Dame, USA
Carlo Blundo, Universita` degli Studi di Salerno, Italy
Srdjan Capkun, ETH Zurich, Switzerland
Liqun Chen, HP Labs, UK
Seung-Geol Choi, University of Maryland, USA
Veronique Cortier, LORIA, France
Jason Crampton, University of London, UK
Frederic Cuppens, Telecom Bretagne, France
Anupam Datta, Carnegie Mellon University, USA
Sabrina De Capitani di Vimercati, Univ. degli Studi di Milano, Italy
Claudia Diaz, K.U. Leuven, Belgium
Wenliang Du, Syracuse University, USA
Simon Foley, University College Cork, Ireland
Keith B. Frikken, Miami University, USA
Dieter Gollmann, TU Hamburg-Harburg, Germany
Dimitris Gritzalis, AUEB, Greece
Ryan Henry, University of Waterloo, Canada
Amir Herzberg, Bar-Ilan University, Israel
Sushil Jajodia, George Mason University, USA
Aaron Johnson, U.S. Naval Research Lab, USA
Stefan Katzenbeisser, TU Darmstadt, Germany
KwangJo Kim, KAIST, Korea
Markulf Kohlweiss, Microsoft Research, UK
Michiharu Kudo, IBM Tokyo Research Laboratory, Japan
Miroslaw Kutylowski, Wroclaw University of Technology, Poland
Adam J. Lee, Univeristy of Pittsburgh, USA
Wenke Lee, Georgia Institute of Technology, USA
Dongdai Lin, Chinese Academy of Sciences, China
Javier Lopez, University of Malaga, Spain
Wenjing Lou, Virginia Polytechnic Institute and State University, USA
John C. Mitchell, Stanford University, USA
Atsuko Miyaji, JAIST, Japan
David Naccache, ENS, France
Peng Ning, North Carolina State University, USA
Stefano Paraboschi, Universita` degli Studi di Bergamo, Italy
Guenther Pernul, University of Regensburg, Germany
Jean-Jacques Quisquater, UCL, Belgium
Indrakshi Ray, Colorado State University, USA
Kui Ren, Illinois Institute of Technology, USA
Peter Ryan, University of Luxembourg, Luxembourg
Ahmad-Reza Sadeghi, TU Darmstadt, Germany
Rei Safavi-Naini, University of Calgary, Canada
Kouichi Sakurai, Kyushu University, Japan
Pierangela Samarati, Universita` degli Studi di Milano, Italy
R. Sekar, Stony Brook University, USA
Elaine Shi, PARC/UC Berkley, USA
Einar Snekkenes, Gjovik University College, Norway
Abhinav Srivastava, AT&T Labs – Research, USA
Carmela Troncoso, K.U. Leuven, Belgium
Yevgeniy Vahlis, AT&T, USA
Jaideep Vaidya, Rutgers University, USA
Michael Waidner, TU Darmstadt, Germany
Shouhai Xu, University of Texas at San Antonio, USA
Ting Yu, North Carolina State University, USA
Jianying Zhou, Institute for Infocomm Research, Singapore

This call for papers and additional information about the conference
can be found at http://www.iit.cnr.it/esorics2012/

Mar 22

3nd International Conference on Symbolic Computation and Cryptography

SCC 2012
3nd International Conference on Symbolic Computation and Cryptography

CIEM – Castro Urdiales, Spain

11-13 July 2012,

http://scc2012.unican.es/

CALL FOR PAPERS

IMPORTANT DATES

Deadline for submission:                            April 28, 2012
Notification of acceptance or rejection:              May 18, 2012
Deadline for final version:                         May 30, 2012
Deadline for registration:                          June 12, 2012
Deadline for special issue JSC:                September 30, 2012

SCC 2012 is the third edition of a new series of conferences where research and development in symbolic computation and cryptography may be presented and discussed. It is organized in response to the growing interest in applying and developing methods, techniques, and software tools of symbolic computation for cryptography. The use of Lattice Reduction algorithms in cryptology and the application of Groebner bases in the context of algebraic attacks are typical examples of explored applications. The SCC 2012 conference is co-located with third Workshop on Mathematical Cryptology (WMC 2012,http://wmc2012.unican.es/), an event also organized by research group Algorithmic Mathematics And Cryptography (AMAC), which will be
held on 9-11 July 2012.

SCC 2012 aims at providing an interactive forum for interested researchers to exchange ideas and views, to present research results and progress, and to learn and discuss recent developments and emerging problems on:

– the design, modelling, and analysis of cryptographic systems and protocols for which symbolic computation may be used or needed;

– the design, implementation, and analysis of algorithms and software tools of symbolic computation that may have potential applications in cryptography.

TOPICS

Specific topics for SCC 2012 include, but are not limited to:

– Multivariate cryptography, braid group cryptography, non-commutative cryptography, and quantum cryptography.

– Code-based, factorization-based, and lattice-based cryptography.

– Algebraic attacks for block ciphers, stream ciphers, and hash functions.

– Design and analysis of algebraic, elliptic, and embedded cryptographic systems and protocols.

– Gröbner basis techniques in cryptology, algebraic number theory, and coding theory.

– Triangular sets and new techniques for solving algebraic systems over finite fields.

– Algorithms and software for symbolic computation in cryptography.

SUBMISSION

Potential participants of SCC 2012 are invited to submit extended abstracts of 3-5 pages or full papers (with at most 14 pages) describing their work to be presented at the conference. The submitted extended abstracts and full papers will be reviewed by members of the program committee (PC) for soundness and relevance to the conference.

Submission of original research papers is encouraged, while published material and work in progress will also be considered for presentation at the conference. We note that there will be no formal proceedings for the SCC 2012 conference; in particular, a paper submitted to SCC 2012 may also be submitted elsewhere after the conference.

Extended abstracts and full papers should be prepared using Springer’s LNCS LaTeX style file available on the SCC 2010 webpage and according to the instructions given therein. Submissions must be done preferably electronically via EasyChair at
https://www.easychair.org/conferences/?conf=scc2012.

There will be no formal proceedings for SCC 2012 conference. However all accepted extended abstracts and full papers will be printed on the conference records for distribution during the event.

SPECIAL ISSUE — JOURNAL OF SYMBOLIC COMPUTATION
We are pleased to announce that a special issue of Journal of Symbolic Computation (http://www.journals.elsevier.com/journal-of-symbolic-computation/)
will be jointly organized with the conference.  We are pleased to announce that a special issue of Journal of Symbolic Computation (http://www.journals.elsevier.com/journal-of-symbolic-computation/) will be jointly organized with the conference. Whilst the submission to this special issue is widely open, authors of the extended abstracts and full papers accepted for presentation at the conference will be encouraged to submit their full and/or revised papers for publication in a special issue of the Journal of Symbolic Computation (http://www.journals.elsevier.com/journal-of-symbolic-computation/).

PROGRAMME CHAIRS
Jean-Charles Faugère, UPMC-INRIA, France
Jaime Gutierrez, Universidad de Cantabria, Santander, Spain

PROGRAMME COMMITTEE (To be completed)

Stanislav Bulygin (Center for Advanced Security Research Darmstadt, Germany)
Carlos Cid (Royal Holloway, University of London, UK)
Danilo Gligoroski (Norwegian University of Science and Technology, Norway)
Martin Kreuzer (Universität Passau, Germany)
Dongdai Lin (Institute of Software of Chinese Academy of Sciences, China)
Vadim Lyubashevsky (INRIA, France)
Gregor Leander (Technical University of Denmark, Denmark)
Ayoub Otmani (GREYC-Ensicaen & University of Caen & INRIA, France)
Ludovic Perret (LIP6-UPMC Univ Paris 6 & INRIA, France)
Vladimir Shpilrain (The City College New York, US)
Boaz Tsaban (Bar-Ilan University, Israel)

LOCAL ORGANISATION

Algorithmic Mathematics And Cryptography
Universidad de Cantabria, Santander
scc2012@unican.es

Mar 22

MoCrySEn 2012 : 1st International Workshop on Modern Cryptography and Security Engineering

When Aug 20, 2012 – Aug 24, 2012
Where Prague, Chezh Republic
Submission Deadline Mar 31, 2012
Notification Due May 1, 2012
Final Version Due Jun 1, 2012

MoCrySEn 2012 : 1st International Workshop on Modern Cryptography and Security Engineering.