Tag: formal

Jan 20

Secrypt 2015

CALL FOR PAPERS

International Conference on Security and Cryptography
SECRYPT website: http://www.secrypt.icete.org/

July 20 – 22, 2015
Colmar, Alsace, France

Sponsored by: INSTICC
INSTICC is Member of: WfMC, OMG and FIPA
Logistics Partner: SCITEVENTS

IMPORTANT DATES:
Regular Paper Submission: March 3, 2015
Authors Notification (regular papers): Mayl 18, 2015
Final Regular Paper Submission and Registration: May 26, 2015

You are cordially invited to submit a paper to the SECRYPT 2015 Conference, to be held in Colmar, Alsace, France. The deadline for paper submission is scheduled for March 3, 2015.

SECRYPT is an annual international conference covering research in information and communication security. The 12th International Conference on Security and Cryptography (SECRYPT 2015) will be held in Colmar, France on 20-22 July 2015.
The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography.

Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and general survey papers indicating future directions are also encouraged.

SECRYPT is interested in promoting high quality research as it can be confirmed by last year acceptance rates, where from 139 submissions, 21% of which were orally presented and 22% presented as posters.

We would like to highlight the presence of the following keynote speakers:
– Anthony C. Boucouvalas, University of Peloponnese, Greece
– Eleni Karatza, Aristotle University of Thessaloniki, Greece
– Andrew Moore, University of Cambridge, United Kingdom

Submitted papers will be subject to a double-blind review process. All accepted papers will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support.
It is planned to publish a short list of revised and extended versions of presented papers with Springer in a CCIS Series book (final approval pending).

The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP, EI (Elsevier Index) and Scopus.
All papers presented at the conference venue will be available at the SCITEPRESS Digital Library (http://www.scitepress.org/DigitalLibrary/). SCITEPRESS is a member of CrossRef (http://www.crossref.org/).

Best paper awards will be distributed during the conference closing session. Please check the website for further information (http://www.secrypt.icete.org/BestPaperAward.aspx).

Workshops, Special sessions, Tutorials as well as Demonstrations dedicated to other technical/scientific topics are also envisaged: companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat. Workshop chairs and Special Session chairs will benefit from logistics support and other types of support, including secretariat and financial support, to facilitate the development of a valid idea.

SECRYPT is part of ICETE, the 12th International Joint Conference on e-Business and Telecommunications. Registration to SECRYPT allows free access to all other ICETE conferences.

ICETE 2015 will be held in conjunction with ICINCO 2015, ICSOFT 2015, SIMULTECH 2015 and DATA 2015. Registration to ICETE allows free access to the ICINCO, ICSOFT, SIMULTECH and DATA conferences as a non-speaker.

ICETE CONFERENCE CO-CHAIRS
Mohammad S. Obaidat, Monmouth University, United States
Pascal Lorenz, University of Haute Alsace, France

PROGRAM CHAIR:
Pierangela Samarati, Universita degli Studi di Milano, Italy

PROGRAM COMMITTEE:
Please check the program committee members at http://www.secrypt.icete.org/ProgramCommittee.aspx

CONFERENCE TOPICS:

– Access Control
– Applied Cryptography
– Biometrics Security and Privacy
– Critical Infrastructure Protection
– Data Integrity
– Data Protection
– Database Security and Privacy
– Digital Forensics
– Digital Rights Management
– Ethical and Legal Implications of Security and Privacy
– Formal Methods for Security
– Human Factors and Human Behavior Recognition Techniques
– Identification, Authentication and Non-repudiation
– Identity Management
– Information Hiding
– Information Systems Auditing
– Insider Threats and Countermeasures
– Intellectual Property Protection
– Intrusion Detection & Prevention
– Management of Computing Security
– Network Security
– Organizational Security Policies
– Peer-to-Peer Security
– Personal Data Protection for Information Systems
– Privacy
– Privacy Enhancing Technologies
– Reliability and Dependability
– Risk Assessment
– Secure Software Development Methodologies
– Security and Privacy for Big Data
– Security and privacy in Complex Systems
– Security and Privacy in Crowdsourcing
– Security and Privacy in IT Outsourcing
– Security and Privacy in Location-based Services
– Security and Privacy in Mobile Systems
– Security and Privacy in Pervasive/Ubiquitous Computing
– Security and Privacy in Smart Grids
– Security and Privacy in Social Networks
– Security and Privacy in the Cloud
– Security and Privacy in Web Services
– Security and Privacy Policies
– Security Area Control
– Security Deployment
– Security Engineering
– Security in Distributed Systems
– Security Information Systems Architecture
– Security Management
– Security Metrics and Measurement
– Security Protocols
– Security requirements
– Security Verification and Validation
– Sensor and Mobile Ad Hoc Network Security
– Service and Systems Design and QoS Network Security
– Software Security
– Trust management and Reputation Systems
– Ubiquitous Computing Security
– Wireless Network Security

Feb 13

PROOFS: Security Proofs for Embedded Systems

Call for papers: PROOFS 2013
http://www.proofs-workshop.org/

PROOFS: Security Proofs for Embedded Systems
Santa Barbara, CA, USA — Saturday, August 24th, 2013

Goal of the Workshop

The goal of the PROOFS workshop is to promote methodologies that increase the confidence level in the security of embedded systems, especially those that contain cryptographic mechanisms.
Embedded system security currently consists mainly in security by obscurity solutions. This has obvious drawbacks:

* it requires costly black-box evaluation,
* there is no certainty about the correctness of the security, etc.

Formal methods allow to increase the trust level of digital systems. They are very appealing, for the following reasons:

* they are mature in theory, and there are tried and tested methods and tools,
* they have been applied on software for a long time, mainly for safety and conformance tests.

Some important security features (random number generation, physically unclonable functions, etc. ) rely on analog devices. Their correct functioning can be ascertained by techniques such as physical modeling and unitary experimental testing.
An important objective for the PROOFS workshop is to bridge the gap between both topics, and therefore to pave the way to « security by clarity » for embedded systems.

Venue

PROOFS will take place at Santa Barbara, CA, USA on Aug 24th, 2013.

Agenda

The workshop will feature two/three invited talks and contributed talks.

* Submission deadline : Sunday May 26th, 2013
* Authors notification : Sunday July 28th, 2013
* Final version due : Sunday August 11th, 2013
* PROOFS workshop venue : Saturday August 24th, 2013

Programme Committee

* Alessandro Barenghi, Politecnico di Milano, Italy.
* Loïc Correnson, CEA LIST, France.
* Emmanuelle Encrenaz, LIP6, France.
* Naofumi Homma, Tohoku U., Japan.
* Éliane Jaulmes, ANSSI, France.
* Gerwin Klein, NICTA, Australia.
* Debdeep Mukhopadhyay, IIT Kharagpur, India.
* Svetla Nikova, K.U.Leuven, Belgium.
* Bruno Robisson, ENSMSE, France.
* Graham Steel, LSV, France.
* Medhi Tibouchi, NTT, Japan.

Steering committee

* Sylvain Guilley, TELECOM-ParisTech, France.
* Çetin Kaya Koç, UCSB, USA.
* David Naccache, ENS, France.
* Akashi Satoh, AIST, Japan.
* Werner Schindler, BSI, Germany.

Local Committee

* Jean-Luc Danger, TELECOM-ParisTech, France.
* Çetin Kaya Koç, UCSB, USA.

Jan 30

10th International Conference on Security and Cryptography (SECRYPT 2013)

10th International Conference on Security and Cryptography (SECRYPT 2013)
Reykjavik, Iceland, July 29-31, 2013
http://secrypt.icete.org

In Cooperation with: ACM SIGSAC
Co-organized by: RU – Reykjavik University
Sponsored by: INSTICC
INSTICC is Member of: WfMC

************************************************************************

Dear ,

SECRYPT is an annual international conference covering research in information and communication security. The 10th International Conference on Security and Cryptography (SECRYPT 2013) will be held in Reykjavik, Iceland. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography. Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. The conference topics include, but are not limited to:

TOPICS OF INTEREST
. Access Control
. Applied Cryptography
. Biometrics Security and Privacy
. Critical Infrastructure Protection
. Data Integrity
. Data Protection
. Database Security and Privacy
. Digital Forensics
. Digital Rights Management
. Ethical and Legal Implications of Security and Privacy
. Formal Methods for Security
. Human Factors and Human Behavior Recognition Techniques
. Identification, Authentication and Non-repudiation
. Identity Management
. Information Hiding
. Information Systems Auditing
. Insider Threats and Countermeasures
. Intellectual Property Protection
. Intrusion Detection & Prevention
. Management of Computing Security
. Network Security
. Organizational Security Policies
. Peer-to-Peer Security
. Personal Data Protection for Information Systems
. Privacy
. Privacy Enhancing Technologies
. Reliability and Dependability
. Risk Assessment, etc

SECRYPT is interested in promoting high quality research as it can be confirmed by last year acceptance rates, where from 170 submissions, 12% were accepted as full papers. Additionally, 14% were presented as short papers and 11% as posters.

PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings.
All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations).
Submissions are to be made through the submission web site at www.insticc.org/Primoris.

Two categories of papers can be submitted:
– Full Paper: A regular paper presents a work where the research is completed or almost finished.
– Position Paper: A position paper presents results that are preliminary or that simply require few pages to describe.
A position paper may be a short report and discussion of ideas, facts, situations, methods, procedures or results of scientific research (bibliographic, experimental, theoretical, or other) focused on one of the conference topics.

We would like to highlight the presence of the following keynote speakers:
– Laurence T. Yang, St Francis Xavier University, Canada
– Pascal Lorenz, University of Haute Alsace, France

Submitted papers must be formatted according to the SECRYPT format (apart for blinding authors), which is described at www.secrypt.icete.org/GuidelinesTemplates.aspx.
Submitted papers will be subject to a double-blind review process.

All accepted papers will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support.
A short list of presented papers will be selected so that revised and extended versions of these papers will be published by Springer-Verlag in a CCIS Series book.

The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP and EI (Elsevier Index).
All papers presented at the conference venue will be available at the SCITEPRESS Digital Library (www.scitepress.org/DigitalLibrary). SCITEPRESS is member of CrossRef (www.crossref.org).
Authors of accepted papers must guarantee that their papers will be presented at the conference.

IMPORTANT DATES
Full Paper submission: February 28, 2013
Authors Notification: May 6, 2013
Camera Ready Submission and Authors Registration: May 20, 2013

ICETE CONFERENCE CHAIR
Mohammad S. Obaidat, Monmouth University, U.S.A.

PROGRAM CHAIR
Pierangela Samarati, Universita’ degli Studi di Milano, Italy

PROGRAM COMMITTEE
tba

This call for papers and additional information about the conference can be found at www.secrypt.icete.org

For any questions, please contact the program chair:
secrypt2013@unimi.it

Jan 22

11th International Conference on Applied Cryptography and Network Security (ACNS 2013)

11th International Conference on
Applied Cryptography and Network Security (ACNS 2013)
Banff, Alberta, Canada
June 25 – 28, 2013
http://acns2013.cpsc.ucalgary.ca

Paper submission due: February 1, 2013
**********************************************************************

The 11th International Conference on Applied Cryptography and Network
Security (ACNS 2013) will be held in Banff, Alberta, Canada. The
conference seeks submissions from academia, industry, and government
presenting novel research on all aspects of applied cryptography as
well as network security and privacy. Submissions in emerging areas of
security including cloud security, secure infrastructure for big data
are highly encouraged. Papers describing novel paradigms, original
directions, or non-traditional perspectives are also encouraged. The
conference has two tracks: a research track and an industry track.
The industrial track will consist of presentations and tutorial
sessions, without formal proceedings. Submissions for either track
may focus on new visions, industrial challenges, case studies or
experimental reports related to implementation or deployment of
real-world systems or policies. Tutorials can cover current techniques
or best practices in applying cryptography to computer and information
systems. Topics of interest include, but are not limited to:

– Access control
– Applied cryptography
– Automated  protocols analysis
– Biometric security and privacy
– Complex systems security
– Critical infrastructure protection
– Cryptographic primitives and protocols
– Data protection
– Database and system security
– Digital rights management
– Email and web security
– Identity management
– Intellectual property protection
– Internet fraud
– Intrusion detection and prevention
– Key management
– Malware
– Network security protocols
– Privacy, anonymity, and untraceability
– Privacy-enhancing technology
– Protection for the future Internet
– Secure mobile agents and mobile code
– Security and privacy in cloud and grid systems
– Security and privacy in smart grids
– Security and privacy in wireless networks
– Security and privacy metrics
– Security in distributed systems
– Security in e-commerce
– Security in P2P systems
– Security in pervasive/ubiquitous computing
– Trust management
– Usability and security

SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap with papers that
have already been published, or are simultaneously submitted to
a journal or a conference with proceedings. All submissions should
be appropriately anonymized (i.e., papers should not contain author
names or affiliations, or obvious citations). Submissions should be
at most 18 pages for research track and at most 8 pages for industry
track, including the bibliography and well-marked appendices, and
should follow Springer’s LNCS style. Submissions are to be made
through the submission web page at http://acns2013.cpsc.ucalgary.ca/.
Only pdf files will be accepted. Submissions not meeting these
guidelines risk rejection without consideration of their merits.
Papers must be received by the deadline of February 1, 2013 (11:59
Pacific Time). Authors should indicate whether their submission
should be considered for the best student paper award; any paper
co-authored by at least a full time student is eligible for this
award. At least one author of a accepted paper must attend the
conference. Papers accepted for the research track will be
published in proceedings published by Springer’s LNCS and
available at the conference. Extended versions of selected best
papers will be invited for a special issue in the Journal of
Computer Security.

IMPORTANT DATES
Submissions Due:     February 1, 2013
Author Notification: April 10, 2013
Camera Ready Due:    April 24, 2013

PROGRAM CHAIRS
Rei Safavi-Naini     (University of Calgary, Canada)
Michael E. Locasto   (University of Calgary, Canada)

GENERAL CHAIRS
Michael Jacobson     (University of Calgary, Canada)
Payman Mohassel      (University of Calgary, Canada)

PUBLICITY CHAIR
Mahabir Jhanwar      (University of Calgary, Canada)

PROGRAM COMMITTEE
Bill Aiello         (University of British Columbia, Canada)
Giuseppe Ateniese    (Sapienza-U. of Rome, Italy & Johns Hopkins U., USA)
Kevin R. B. Butler   (University of Oregon, USA)
Srdjan Capkun        (ETH Zurich, Switzerland)
Alvaro A. Cárdenas   (University of Texas at Dallas, USA)
Chen-Mou Cheng       (National Taiwan University, Taiwan)
Sherman S. M. Chow   (Chinese University of Hong Kong, Hong Kong)
Ed Dawson            (Queensland University of Technology, Australia)
Roberto Di Pietro    (Università Roma Tre, Italy)
José M. Fernandez    (École Polytechnique de Montréal, Canada)
Sara Foresti         (Università degli Studi di Milano, Italy)
Guang Gong           (University of Waterloo, Canada)
Stefanos Gritzalis   (University of the Aegean, Greece)
Guofei Gu            (Texas A&M University, USA)
Angelos D. Keromytis (Columbia University, USA)
Evangelos Kranakis   (Carleton University, Canada)
Ralf Kusters         (Universität Trier, Germany)
Xuejia Lai           (Shanghai Jiao Tong University, China)
Cédric Lauradoux     (INRIA, France)
Ninghui Li           (Purdue University, USA)
Yingjiu Li           (Singapore Management University, Singapore)
Mark Manulis         (University of Surrey, UK)
Kaisa Nyberg         (Aalto University, Finland)
Massimiliano Pala    (Penango/OpenCA, USA)
Bart Preneel         (KU Leuven, Belgium)
Christian Rechberger (DTU, Denmark)
Ahmad-Reza Sadeghi   (Technische Universitãt Darmstadt, Germany)
Pierangela Samarati  (Università degli Studi di Milano, Italy)
Radu Sion            (Stony Brook University, USA)
Anil Somayaji        (Carleton University, Canada)
Abhinav Srivastava   (AT&T Research, USA)
Jessica Staddon      (Google, USA)
Willy Susilo         (University of Wollongong, Australia)
Gene Tsudik          (UC Irvine, USA)
Duncan S. Wong       (City University of Hong Kong, Hong Kong)
Jianying Zhou        (I2R, Singapore)

This call for papers and additional information about the
conference can be found at http://acns2013.cpsc.ucalgary.ca

The history and statistics of ACNS can be found at ACNS Home
— http://icsd.i2r.a-star.edu.sg/staff/jianying/acns_home/

ACNS forum at LinkedIn —
http://www.linkedin.com/groups/ACNS-Applied-Cryptography-Network-Security-4290836

**********************************************************************

Dec 07

AVOTE : Principaux résultats du projet

Principaux résultats du projet

Le vote électronique offre de nombreux avantages comme le vote à distance ou l’automatisation de la phase de dépouillement. Cependant, la moindre faille dans un système de vote électronique pourrait conduire à une fraude à grande échelle. L’objectif général du projet était de concevoir des techniques pour analyser la sécurité des protocoles de vote. Nos résultats s’articulent sur quatre principaux plans.

  • Formalisation de propriétés: Nous avons identifié et formalisé les propriétés souhaitées: correction du résultat, confidentialité des votes, impossibilité pour un votant de révéler son vote, vérifiabilité du processus de vote. Nous avons défini formellement ces propriétés dans des modèles symboliques, souvent sous la forme de propriété d’équivalence. (, )
  • Procédures de décision:
    Nous avons développé des techniques pour déterminer si un protocole de vote assure ou non les propriétés souhaitées comme par exemple la confidentialité d’un vote. D’un point de vue technique, cela revient à décider des propriétés d’équivalence sur des algèbres de processus. Nos travaux ont porté sur deux principaux types d’équivalence: équivalence statique (pour un intrus observateur) et équivalence observationnelle (pour un intrus pleinement actif). Dans les deux cas, les propriétés des primitives cryptographiques (chiffrement, ou exclusif, …) sont axiomatisées par des théories équationnelles. Nous avons obtenu de nombreux résultats de décision aussi bien pour l’équivalence statique que pour l’équivalence observationnelle, et cela pour différentes théories équationnelles. (, , , [CD10], , )
  • Outils:
    Nous avons réalisé quatre prototypes pour analyser automatiquement des propriétés d’équivalence de protocoles, et en particulier la confidentialité dans les protocoles de vote. Nos quatre prototypes sont KiSs et , pour un attaquant observateur, ainsi que aKiSs et ADECS/Datep, pour un attaquant pleinement actif.
  • Études de cas:
    Nous avons validé nos résultats sur plusieurs études de cas issues de la littérature dont le protocole FOO, qui est à la base de nombreux protocoles utilisant les signatures en aveugle et le protocole JCJ implémenté en tant que CIVITAS. Nous avons également analysé Helios, un protocole de vote réel, développé récemment par Ben Adida et le Crypto Group de l’Université Catholique de Louvain (UCL). Ce protocole a été utilisé plusieurs fois pour des élections grandeur nature, par exemple en 2009 pour l’élection du recteur de l’UCL avec plus de 5000 votants et aussi en 2010 par l’association internationale de cryptographie (IACR) pour élire son conseil. Nous avons mis à jour une faille dans le protocole Helios permettant de mettre à mal la confidentialité des votes. Nous avons proposé une correction, ainsi qu’une preuve de confidentialité pour la nouvelle version ainsi obtenue. Nous avons également montré qu’Helios assurait la vérifiabilité individuelle et la vérifiabilité universelle, permettant une transparence du scrutin. ([DKR09b], , [KSR10])
    Une autre étude de cas pratique fut le protocole de vote à distance (bulletins imprimés avec codes à barre) utilisé par le CNRS dans le cadre d’élection au CAES (comité d’entreprise du CNRS). Nous avons montré comment il était possible de « bourrer les urnes » et notifié le CNRS . Un correctif a été apporté par la société prestataire, pour le scrutin suivant. ()

L’ensemble des publications du projet est disponible iciSuite du projet: Une partie des thèmes de recherche du projet ANR AVOTÉ a été reprise dans le projet ERC ProSecure (Provably secure systems: foundations, design, and modularity) et dans le projet ANR VIP (Programme JCJC) (Verification of Indistinguishability Properties). Le projet ProSecure a pour but de développer des techniques modulaires et génériques pour analyser de nouvelles familles de protocoles de sécurité, et notamment les protocoles de vote. Le projet VIP s’intéresse plus particulièrement à l’analyse de propriétés du type “respect de la vie privée” qui jouent un rôle important dans de nombreuses applications (dont les protocoles de vote). Une variante d’Helios, appelée Helios-C, est en cours de développement. Cette variante permet d’être conforme aux recommandations de la CNIL (le nom des électeurs ne doit pas être public), tout en garantissant toujours la confidentialité des vote et la vérifiabilité du scrutin, même vis-à-vis d’une urne hébergée sur un serveur malhonnête.

Analyse formelle de protocoles de vote électronique (AVOTÉ).

Aug 14

WiSec 2013 : The Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks

 

WiSec 2013 : The Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks

Link: http://www.crysys.hu/recent-news/229-wisec-2013.html
When Apr 17, 2013 – Apr 19, 2013
Where Budapest, Hungary
Submission Deadline Oct 29, 2012
Notification Due Jan 20, 2013
Final Version Due Feb 15, 2013
Categories    wireless   security   communications   networks

Call For Papers

* ACM approval pending

*** PRELIMINARY CALL FOR PAPERS ***

IMPORTANT DATES

Submission Deadline: Oct 29
Notification Date: Jan 20
Camera-Ready Deadline: Feb 15

BROADENED SCOPE

WiSec has been broadening its scope and seeks to present high quality
research papers exploring security and privacy aspects of wireless
communications, mobile networks, and their applications. Beyond the
traditional Wisec staples of physical, link, and network layer security, we
also welcome papers focusing on the security and privacy of mobile software
platforms and the increasingly diverse range of mobile or wireless
applications. The conference welcomes both theoretical as well as systems
contributions.

Topics of interest include, but are not limited to:
* Mobile malware and platform security
* Security & Privacy for Smart Devices (e.g., Smartphones)
* Wireless and mobile privacy and anonymity
* Secure localization and location privacy
* Cellular network fraud and security
* Jamming attacks and defenses
* Key extraction, agreement, or distribution in wireless and mobile
settings
* Theoretical foundations, cryptographic primitives, and formal
methods for wireless security and privacy
* NFC and smart payment applications
* Security and privacy for mobile sensing systems
* Wireless or mobile security and privacy in health, automotive,
avionics, or smart grid applications

The proceedings of ACM WiSec will be published by the ACM (pending
approval).

FULL AND SHORT PAPERS: Full paper submissions to WiSec 2013 can be up to 10
pages in the ACM conference style excluding the bibliography and well marked
appendices, and up to 12 pages in total. WiSec also encourages the
submission of short papers with a length of up to 6 pages, which describe
mature work of a more succinct nature. All papers must be thoroughly
anonymized for double-blind reviewing. Detailed submission instructions
will appear on the conference website
(http://www.sigsac.org/wisec/WiSec2013/SubInstructions.php).

DOUBLE SUBMISSIONS: It is a policy of the ACM
(http://www.acm.org/publications/policies/RightsResponsibilities) to
disallow double submissions, where the same (or substantially similar)
paper is concurrently submitted to multiple conferences/journals. Any
double submissions detected will be immediately rejected from all
conferences/journals involved.

ORGANIZERS

General Chair
Levente Buttyan, Budapest University of Technology and Economics, Hungary

Technical Program Chairs
Ahmad-Reza Sadeghi, Technische Universität Darmstadt, Germany
Marco Gruteser, Rutgers University, USA

Steering committee
N. Asokan, NRC, Finland
Levente Buttyan, BME, Hungary
Claude Castelluccia, INRIA, France
Jean-Pierre Hubaux, EPFL, Switzerland
Douglas Maughan, DHS, USA
Adrian Perrig, CMU, USA
Gene Tsudik, UCI, USA (chair)
Dirk Westhoff, HAW, Germany

WiSec 2013 : The Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks.

Aug 14

ASIACCS 2013 : 8th ACM Symposium on Information, Compuer and Communications Security

 

ASIACCS 2013 : 8th ACM Symposium on Information, Compuer and Communications Security

Link: http://hise.hznu.edu.cn/asiaccs/
When May 8, 2013 – May 10, 2013
Where Hangzhou, China
Submission Deadline Nov 30, 2012
Categories    security

Call For Papers

Building on the success of ACM Conference on Computer and Communications Security (CCS) and ACM Transactions on Information and System Security (TISSEC), the ACM Special Interest Group on Security, Audit, and Control (SIGSAC) formally established the annual ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS). The inaugural ASIACCS was held in Taipei (2006). Since then the ASIACCS have been held in Singapore (2007), Tokyo (2008), Sydney (2009), Beijing (2010), Hong Kong (2011), and Seoul (2012). ASIACCS 2013 is the eighth conference of the series.

ASIACCS is a major international forum for information security researchers, practitioners, developers, and users to explore and exchange the newest cyber security ideas, breakthroughs, findings, techniques, tools, and experiences. We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of computer and network security. Areas of interest for ASIACCS 2012 include, but are not limited to:

access control

identity management

privacy-enhancing technology

accounting and audit

Inference control and disclosure

security in ubiquitous computing

applied cryptography

information warfare

security management

authentication

intellectual-property protection

smartcards

cloud computing security

intrusion detection

software security

data/system integrity

key management

trusted computing

data and application security

malware and botnets

wireless security

digital-rights management

mobile-computing security

web security

formal methods for security

operating system security

hardware-based security

phishing and countermeasures

Important Dates

Submission Deadline: 30 November 2012, 23:59 UTC (Firm Deadline)
Acceptance Notification: 29 January 2013
Camera-ready Copy Due: 18 February 2013
Conference: 8-10 May 2013

Instructions for authors Submissions must be written in English, and must be at most 10 pages in 10pt, double-column format excluding the bibliography and well-marked appendices, and at most 12 pages overall. Committee members are not required to read appendices, so the paper should be intelligible without them. Submissions must be in ACM SIGPLAN format (http://www.sigplan.org/authorInformation.htm) with page numbers (so, LaTeX users should specify documentclass[10pt,preprint]{sigplanconf}). No changes to margins, spacing, or font sizes (or anything else) are allowed from those specified by the style file. We reserve the right to request the source files for a submission to verify compliance with this requirement. Only PDF files will be accepted.

All submissions must be anonymized. An author’s name should occur only in references to that author’s related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the conference.

Accepted papers will be published by ACM Press in conference proceedings and in the ACM Digital Library. Final proceedings versions will be 10 pages in double-column ACM format, although authors will have the option of buying a limited number of additional pages. In addition to regular papers, some short papers could also be accepted and included in the proceedings.

ASIACCS 2013 : 8th ACM Symposium on Information, Compuer and Communications Security.

Aug 09

Eleventh Smart Card Research and Advanced Application Conference – Cardis 2012

CARDIS 2012 – Call for Papers
—————————–
Eleventh Smart Card Research and Advanced Application Conference

Since 1994, CARDIS is the foremost international conference dedicated
to smart card research and applications. Smart cards and secure
elements are the basis for many secure systems and play a decisive
role in ID management. Established computer science areas like
hardware design, operating systems, system modeling, cryptography,
verification and networking got adapted to this fast growing
technology and investigate emerging issues resulting from it. Unlike
events devoted to commercial and application aspects of smart cards,
CARDIS conferences gather researchers and technologists who focus on
all aspects of the design, development, deployment, validation and
application of smart cards and secure elements in secure platforms or
systems.

The eleventh Smart Card Research and Advanced Application IFIP
Conference, organized by the Institute for Applied Information
Processing and Communications (IAIK), Graz University of Technology,
will be held in the Weitzer Hotel, Graz, Austria.
The program committee is seeking original papers on all aspects of
smart cards and secure elements. Submissions across a broad range of
the development phases are encouraged, from exploratory research and
proof-of-concept studies to practical applications and deployment of
smart cards and related technologies. Topics of interest include, but
are not limited to:
– Software for secure embedded systems (operating systems, virtual
machines, … )
– Hardware architectures for secure embedded systems
– Security of RFID systems and sensor nodes
– Security of mobile devices and applications
– Efficient and secure implementations of cryptographic algorithms
– Cryptographic protocols for embedded systems
– Physical attacks and countermeasures
– Secure applications for embedded systems
– Embedded systems networking
– Person representation in embedded systems
– Formal modeling and formal proofs
– Validation and certification of embedded systems and applications
– Identity, privacy and trust issues

Authors are invited to submit papers (PDF or PS format) with novel
contributions electronically using the submission form available on
the following web site:
http://www.easychair.org/conferences/?conf=cardis2012.
Submitted papers must be original, unpublished, anonymous and not
submitted to journals or other conferences/workshops that have
proceedings. Submissions must be written in English and should be at
most 15 pages in total. Papers not meeting these guidelines risk
rejection without consideration. All submissions will be
blind-refereed.

Submission implies the willingness of at least one of the authors to
register and present the paper. The proceedings will be published in
the Springer Lecture Notes in Computer Science (LNCS) series. Accepted
papers should follow the LNCS default author instructions at
http://www.springer.de/comp/lncs/authors.html.

Important dates
—————

Submission of papers: August 20th, 2012, 23:59 GMT+02
Notification of acceptance: October 15, 2012
Camera-ready version of papers for pre-proceedings: November 7, 2012
Workshop date: November 28–30, 2012
Final version of papers: December 17, 2012

Program Committee
—————–
N. Asokan,  Nokia Research Center, Finland
Gildas Avoine,  UCL, Belgium
Chetali Boutheina,  Trusted Labs, France
Josep Domingo Ferrer,  Rovari i Virgili University, Catalonia
Hermann Drexler,  Giesecke & Devrient, Germany
Martin Feldhofer,  NXP, Austria
Berndt Gammel,  Infineon, Germany
Tim Güneysu,  Ruhr-University Bochum, Germany
Helena Handschuh,  Cryptography Research Inc., USA and KU Leuven, Belgium
Michael Hutter,  TU Graz, Austria
Marc Joye,  Technicolor, France
Ioannis Krontiris,  Göthe Universität Frankfurt, Germany
Jean-Louis Lanet,  University of Limoges, France
Konstantinos Markantonakis,  Royal Holloway, UK
Andrew Martin,  University of Oxford, UK
David Naccache,  ENS, France
Elisabeth Oswald,  University of Bristol, UK
Catuscia Palamidessi,  INRIA, France
Eric Peeters,  Texas Instruments, USA
Erik Poll,  RU Nijmegen, Netherlands
Bart Preneel,  KU Leuven, Belgium
Emmanuel Prouff,  ANSSI, France
Matthieu Rivain,  CryptoExperts, France
Pankaj Rohatgi,  Cryptography Research, USA
Ahmad-Reza Sadeghi,  TU Darmstadt, Germany
Jean-Pierre Seifert,  TU Berlin, Germany
Sergei Skorobogatov,  Cambridge University, UK
François-Xavier Standaert,  UCL, Belgium
Frederic Stumpf,  Fraunhofer AISEC, Germany
Marc Witteman,  Riscure, Netherlands

Organizational Committee
————————
Stefan Mangard
(Program Chair)
Infineon Technologies, Germany
Email: Stefan.Mangard AT infineon.com

Jörn-Marc Schmidt
(General Chair)
Graz University of Technology, Austria
Email: joern-marc.schmidt AT iaik.tugraz.at

Jean-Jacques Quisquater
(Publicity Chair)
Université catholique de Louvain, Belgium
Email: jjq AT uclouvain.be

Jul 04

International Symposium on Engineering Secure Software and Systems (ESSoS)

Call For Papers

International Symposium on Engineering Secure Software and Systems (ESSoS)

http://distrinet.cs.kuleuven.be/events/essos/2013/

February 27 – March 1, 2013, Paris, France

In cooperation with (pending): ACM SIGSAC and SIGSOFT and IEEE CS (TCSE).

CONTEXT AND MOTIVATION

Trustworthy, secure software is a core ingredient of the modern world.
Hostile, networked environments, like the Internet, can allow
vulnerabilities in software to be exploited from anywhere.  To address this,
high-quality security building blocks (e.g., cryptographic components) are
necessary, but insufficient. Indeed, the construction of secure software is
challenging because of the complexity of modern applications, the growing
sophistication of security requirements, the multitude of available software
technologies and the progress of attack vectors.
Clearly, a strong need exists for engineering techniques that scale well and
that demonstrably improve the software’s security properties.

GOAL AND SETUP

The goal of this symposium, which will be the fifth in the series, is to
bring together researchers and practitioners to advance the states of the
art and practice in secure software engineering. Being one of the few
conference-level events dedicated to this topic, it explicitly aims to
bridge the software engineering and security engineering communities, and
promote cross-fertilization. The symposium will feature two days of
technical program, and is also open to proposals for both tutorials and
workshops. In addition to academic papers, the symposium encourages
submission of high-quality, informative experience papers about successes
and failures in security software engineering and the lessons learned.
Furthermore, the symposium also accepts short idea papers that crisply
describe a promising direction, approach, or insight.

TOPICS

The Symposium seeks submissions on subjects related to its goals. This
includes a diversity of topics including (but not limited to):

– scalable techniques for threat modeling and analysis of vulnerabilities
– specification and management of security requirements and policies
– security architecture and design for software and systems
– model checking for security
– specification formalisms for security artifacts
– verification techniques for security properties
– systematic support for security best practices
– security testing
– security assurance cases
– programming paradigms, models and DLS’s for security
– program rewriting techniques
– processes for the development of secure software and systems
– security-oriented software reconfiguration and evolution
– security measurement
– automated development
– trade-off between security and other non-functional requirements (in
particular
economic considerations)
– support for assurance, certification and accreditation
– empirical secure software engineering

SUBMISSION AND FORMAT

The proceedings of the symposium are published by Springer-Verlag (pending)
in the Lecture Notes in Computer Science Series
(http://www.springer.com/lncs).
Submissions should follow the formatting instructions of Springer LNCS.
Submitted papers must present original, non-published work of high quality.

For selected papers, there will be an invitation to submit extended versions
to a special issue in the International Journal of Information Security.

Two types of papers will be accepted:

Full papers (max 14 pages without bibliography/appendices) – May describe
original technical research with a solid foundation, such as formal analysis
or experimental results, with acceptance determined mostly based on novelty
and validation. Or, may describe case studies applying existing techniques
or analysis methods in industrial settings, with acceptance determined
mostly by the general applicability of techniques and the completeness of
the technical presentation details.

Idea papers (max 8 pages with bibliography) – May crisply describe a novel
idea that is both feasible and interesting, where the idea may range from a
variant of an existing technique all the way to a vision for the future of
security technology.
Idea papers allow authors to introduce ideas to the field and get feedback,
while allowing for later publication of complete, fully-developed results.
Submissions will be judged primarily on novelty, excitement, and exposition,
but feasibility is required, and acceptance will be unlikely without some
basic, principled validation (e.g., extrapolation from limited experiments
or simple formal analysis). In the proceedings, idea papers will clearly
identified by means of the “Idea” tag in the title.

Proposals for both tutorials and workshops are welcome. Further guidelines
will appear on the website of the symposium.

IMPORTANT DATES

Paper submission:             September 30, 2012
Author notification:           November 22, 2012
Camera-ready:                  December 13, 2012

PROGRAM COMMITTEE

PC Co-Chairs

Jan Jürjens, TU Dortmund and Fraunhofer ISST
Ben Livshits, Microsoft Research

PC
Davide Balzarotti, EURECOM, France
Ruth Breu, University of Innsbruck, Austria
Cristian Cadar, Imperial College, UK
Julian Dolby, IBM Research, US
Matt Fredrikson, University of Wisconsin, US
Dieter Gollmann, TU Hamburg-Harburg, Germany
Maritta Heisel, U. Duisburg Essen, Germany
Peter Herrmann, NTNU, Trondheim, Norway
Thorsten Holz, U. Ruhr Bochum, Germany
Sergio Maffeis, Imperial College, UK
Heiko Mantel, TU Darmstadt, Germany
Anders Møller, Aarhus University, Denmark
Haris Mouratidis, University of East London, UK
Zachary Peterson, Naval Postgraduate School, US
Frank Piessens, KU Leuven, Belgium
Erik Poll, RU Nijmegen, NL
Alexander Pretschner, TU Munich, Germany
Wolfgang Reif, University of Augsburg, Germany
Jianying Zhou, Institute for Infocomm Research, Singapore
Mohammad Zulkernine, Queens University, Canada

Jun 11

CALL FOR PAPERS: IEEE-AESS Conference in Europe about Space and Satellite Communications : Security and Privacy Special Track

=================================
CALL FOR PAPERS
Security and Privacy Special Track
IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL)
Rome, Italy, October 2-5, 2012
http://estel-sec.dti.unimi.it/
=================================
The special track on Security and Privacy of the ESTEL Conference aims at providing a
forum for discussing security and privacy issues that need to be investigated for
providing advanced services, architectures, and technologies for space and satellite
applications.  In this context, it is of utmost importance to ensure proper protection to
such complex systems, or systems-of-systems, to ensure security, privacy, and availability
of the infrastructure as well as of resources and information it provides and
manages. These aspects concern both the specific satellite application and infrastructure
as well as the base stations and land data servers and communications that serve them,
touching then the different areas with ICT.  The problem is far from trivial, due to the
criticality and the social impact of the applications and services relying on this global
infrastructure, as well as the complexity given by the co-existence and co-operation of,
possibly heterogeneous, component systems. Topics of interest include, but are not limited
to:
– Access Control
– Applied Cryptography for Space Applications
– Authentication
– Biometrics Security and Privacy
– Critical Infrastructure Protection
– Data Integrity
– Data Protection
– Database Security and Privacy
– Digital Forensics
– Digital Rights Management
– Ethical and Legal Implications of Security and Privacy
– Formal Methods for Security
– Homeland Security
– Human Factors and Human Behaviour Recognition Techniques
– Identification, Authentication and Non-repudiation
– Identity Management
– Information Hiding
– Information Systems Auditing
– Insider Threats and Countermeasures
– Intellectual Property Protection
– Intrusion Detection & Prevention
– Management of Computing Security
– Organizational Security Policies
– Peer-to-Peer Security
– Privacy
– Privacy Enhancing Technologies
– Reliability and Dependability
– Risk Assessment
– Satellite-based Disaster Recovery
– Satellite Network Security
– Secure Cloud Computing
– Secure Software Development Methodologies
– Security Protocols
– Security and Privacy in Mobile Systems
– Security and Privacy in Complex Systems
– Security and Privacy in IT Outsourcing
– Security and Privacy in Location-based Services
– Security and Privacy in Pervasive/Ubiquitous Computing
– Security and Privacy in Satellite Surveillance
– Security and Privacy in Web Services
– Security and Privacy Policies
– Security Area Control
– Security Deployment
– Security Engineering
– Security for Grid Computing
– Security in Distributed Systems
– Security Information Systems Architecture and Design and Security Patterns
– Security in e-Healthcare
– Security Issues of Satellite Communications
– Security Management
– Security Metrics and Measurement
– Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
– Security Verification and Validation
– Sensor and Mobile Ad Hoc Network Security
– Service and Systems Design and QoS Network Security
– Software Security
– Trust Management and Reputation Systems
– Ubiquitous Computing Security
– Wireless Network Security
SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have been published or that are
simultaneously submitted to a journal or a conference with proceedings. Submitted papers
must be formatted according to the IEEE Conference proceedings format, available at
http://www.ieee.org/publications_standards/publications/authors/authors_journals.html.
Submissions should be at most 6 pages. Submissions are to be made to the submission
web site at https://www.easychair.org/conferences/?conf=estelsec2012. Only pdf files will be
accepted. Submissions not meeting these guidelines risk rejection without consideration of their
merits. Papers must be received by the deadline of July 20, 2012 (11:59 p.m. American Samoa time).
All accepted papers will be published in the conference proceedings. Authors of accepted papers
must guarantee that their papers will be presented at the conference. A one-day registration
option will be made available to special session attendees.
IMPORTANT DATES
Paper submission due: July 20, 2012 (11:59 p.m. American Samoa time)
Notification to authors: August 25, 2012
Camera ready due: September 5, 2012
SPECIAL TRACK PROGRAM CHAIR
Pierangela Samarati
Universita’ degli Studi di Milano, Italy
PROGRAM COMMITTEE
tba
This call for papers and additional information about the conference
can be found at http://estel-sec.dti.unimi.it/