Tag: identity

Apr 18

8th International Workshop on Security and Trust Management (STM 2012)

CALL FOR PAPERS
8th International Workshop on Security and Trust Management (STM 2012)
in conjunction with ESORICS 2012
Pisa, Italy – September 13-14, 2012

STM (Security and Trust Management) is a working group of ERCIM
(European Research Consortium in Informatics and Mathematics). STM
2012 is the eighth workshop in this series and will be held in Pisa,
Italy, in conjunction with the 17th European Symposium on Research in
Computer Security (ESORICS 2012).  The workshop seeks submissions from
academia, industry, and government presenting novel research on all
theoretical and practical aspects of security and trust in ICTs.
Topics of interest include, but are not limited to:

– Access control
– Anonymity
– Applied cryptography
– Authentication
– Complex systems security
– Data and application security
– Data protection
– Data/system integrity
– Digital right management
– Economics of security and privacy
– E-services
– Formal methods for security and trust
– Identity management
– Legal and ethical issues
– Networked systems security
– Operating systems security
– Privacy
– Security and trust metrics
– Security and trust policies
– Security and trust management architectures
– Security and trust in cloud environments
– Security and trust in grid computing
– Security and trust in pervasive computing
– Security and trust in social networks
– Social implications of security and trust
– Trust assessment and negotiation
– Trust in mobile code
– Trust models
– Trust management policies
– Trust and reputation systems
– Trusted platforms
– Trustworthy systems and user devices
– Web services security

SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. All submissions should be appropriately
anonymized (i.e., papers should not contain author names or
affiliations, or obvious citations). Submissions should be at most 16
pages, including the bibliography and well-marked appendices, and
should follow the LNCS style. Submissions are to be made to the
submission web site at (to be announced). Only pdf files will be
accepted. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Papers must be received by the
deadline of May 25, 2012 ({11:59 p.m. American Samoa time}).  Authors
of accepted papers must guarantee that their papers will be presented
at the workshop. Pre-proceedings will be made available at the
workshop.  As for previous STM events, it is planned to have
post-proceedings published by Springer in the Lecture Notes in
Computer Science (LNCS) series.

IMPORTANT DATES
Paper submission due: May 25, 2012
Notification to authors: July 15, 2012
Camera ready due: August 1, 2012

GENERAL CHAIR
Marinella Petrocchi
CNR, Italy

PROGRAM CHAIRS
Audun Josang
University of Oslo, Norway

Pierangela Samarati
Universita’ degli Studi di Milano, Italy

PUBLICITY CHAIR
Giovanni Livraga
Universita’ degli Studi di Milano, Italy

PROGRAM COMMITTEE
Rafael Accorsi, University of Freiburg, Germany
Rose-Mharie Åhlfeldt, University of Skövde, Sweden
Alessandro Armando, Universita’ degli Studi di Genova, Italy
Gilles Barthe, IMDEA Software, Spain
Jason Crampton, Royal Holloway University of London, UK
Naranker Dulay, Imperial College London, UK
Mathias    Ekstedt, KTH Royal Institute of Technology, Sweden
Carmen Fernández-Gago, University of Málaga, Spain
Sara Foresti, Universita’ degli Studi di Milano, Italy
Jochen Haller, SAP Research, Germany
Michael Huth, Imperial College London, UK
Sushil Jajodia, George Mason University, USA
Christian Jensen, Technical University of Denmark, Denmark
Henrik Johnsson, Blekinge Institute of Technology, Sweden
Lalana Kagal, MIT, USA
Guenter Karjoth, IBM Research, Switzerland
Stewart Kowalski, Stokholm University, Sweden
Giovanni Livraga, Universita’ degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Fabio Martinelli, CNR, Italy
Sjouke Mauw, University of Luxembourg, Luxembourg
Catherine Meadows, US Naval Research Laboratory, USA
Stig Mjølsnes, Norwegian University of Science and Technology, Norway
Simin Nadjm-Tehrani, Linköpings University, Sweden
Masakatsu Nishigaki, Shizuoka University, Japan
Marina Papatriantafilou, Chalmers University of Technology, Sweden
Guenter Pernul, University of Regensburg, Germany
Walter Quattrociocchi, CNR, Italy
Silvio Ranise, Fondazione Bruno Kessler, Italy
Ketil Stolen, University of Oslo, Norway
Vipin Swarup, The MITRE Corporation, USA
Sotirios Terzis, University of Strathclyde, UK
Mahesh Tripunitara, University of Waterloo, Canada

Conference web page http://stm2012.dti.unimi.it
PC chairs email: tm2012@unimi.it

Mar 28

ESORICS 2012 : Deadline extended

*** Deadline extended to April 10, 2012 ***

CALL FOR PAPERS

******************************************************************************
17th European Symposium on Research in Computer Security (ESORICS 2012)
Pisa, Italy — September 10-12, 2012
http://www.iit.cnr.it/esorics2012/
******************************************************************************

ESORICS is the annual European research event in Computer Security.
The Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the academic
and industrial communities.  Papers offering novel research contributions
in computer security are solicited for submission to the Symposium.
The primary focus is on original, high quality, unpublished research
and implementation experiences. We encourage submissions of
papers discussing industrial research and development.
Topics of interest include, but are not limited to:

– access control
– accountability
– ad hoc networks
– anonymity
– applied cryptography
– authentication
– biometrics
– database security
– data protection
– digital content protection
– digital forensic
– distributed systems security
– electronic payments
– embedded systems security
– inference control
– information hiding
– identity management
– information flow control
– integrity
– intrusion detection
– formal security methods
– language-based security
– network security
– phishing and spam prevention
– privacy
– risk analysis and management
– secure electronic voting
– security architectures
– security economics
– security metrics
– security models
– security and privacy in cloud scenarios
– security and privacy in complex systems
– security and privacy in location services
– security and privacy for mobile code
– security and privacy in pervasive/ubiquitous computing
– security and privacy policies
– security and privacy in social networks
– security and privacy in web services
– security verification
– software security
– steganography
– systems security
– trust models and management
– trustworthy user devices
– web security
– wireless security

PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. The proceedings will be published by
Springer in the the Lecture Notes in Computer Science series.
All submissions should follow the LNCS template
(http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0)
from the time they are submitted. Submitted papers should be
at most 16 pages (using 10-point font), excluding the bibliography and
well-marked appendices, and at most 20 pages total. Committee members
are not required to read the appendices, so the paper should be
intelligible without them. All submissions must be written in English.
Submissions are to be made to the submission web site at
http://www.easychair.org/conferences/?conf=esorics2012.
Only pdf files will be accepted. Submissions not meeting these guidelines
risk rejection without consideration of their merits.
Papers must be received by the deadline of April 10, 2012 (11:59 p.m.
American Samoa time). Authors of accepted papers must guarantee that
their papers will be presented at the conference.

IMPORTANT DATES
Paper submission due: April 10, 2012 (11:59 p.m. American Samoa time) [extended]
Notification to authors: June 10, 2012
Camera ready due: June 20, 2012

GENERAL CHAIR
Fabio Martinelli
National Research Council – CNR, Italy

PROGRAM CHAIRS
Sara Foresti
Universita` degli Studi di Milano, Italy

Moti Yung
Google Inc.,  USA

PUBLICITY CHAIR
Giovanni Livraga
Universita` degli Studi di Milano, Italy

PROGRAM COMMITTEE
Alessandro Armando, Universita` di Genova, Italy
Mikhail Atallah, Purdue University, USA
Michael Backes, Saarland University, Germany
David A. Basin, ETH Zurich, Switzerland
Kevin Bauer, University of Waterloo, Canada
Joachim Biskup, University of Dortmund, Germany
Marina Blanton, University of Notre Dame, USA
Carlo Blundo, Universita` degli Studi di Salerno, Italy
Srdjan Capkun, ETH Zurich, Switzerland
Liqun Chen, HP Labs, UK
Seung-Geol Choi, University of Maryland, USA
Veronique Cortier, LORIA, France
Jason Crampton, University of London, UK
Frederic Cuppens, Telecom Bretagne, France
Anupam Datta, Carnegie Mellon University, USA
Sabrina De Capitani di Vimercati, Univ. degli Studi di Milano, Italy
Claudia Diaz, K.U. Leuven, Belgium
Wenliang Du, Syracuse University, USA
Simon Foley, University College Cork, Ireland
Keith B. Frikken, Miami University, USA
Dieter Gollmann, TU Hamburg-Harburg, Germany
Dimitris Gritzalis, AUEB, Greece
Ryan Henry, University of Waterloo, Canada
Amir Herzberg, Bar-Ilan University, Israel
Sushil Jajodia, George Mason University, USA
Aaron Johnson, U.S. Naval Research Lab, USA
Stefan Katzenbeisser, TU Darmstadt, Germany
KwangJo Kim, KAIST, Korea
Markulf Kohlweiss, Microsoft Research, UK
Michiharu Kudo, IBM Tokyo Research Laboratory, Japan
Miroslaw Kutylowski, Wroclaw University of Technology, Poland
Adam J. Lee, Univeristy of Pittsburgh, USA
Wenke Lee, Georgia Institute of Technology, USA
Dongdai Lin, Chinese Academy of Sciences, China
Javier Lopez, University of Malaga, Spain
Wenjing Lou, Virginia Polytechnic Institute and State University, USA
John C. Mitchell, Stanford University, USA
Atsuko Miyaji, JAIST, Japan
David Naccache, ENS, France
Peng Ning, North Carolina State University, USA
Stefano Paraboschi, Universita` degli Studi di Bergamo, Italy
Guenther Pernul, University of Regensburg, Germany
Jean-Jacques Quisquater, UCL, Belgium
Indrakshi Ray, Colorado State University, USA
Kui Ren, Illinois Institute of Technology, USA
Peter Ryan, University of Luxembourg, Luxembourg
Ahmad-Reza Sadeghi, TU Darmstadt, Germany
Rei Safavi-Naini, University of Calgary, Canada
Kouichi Sakurai, Kyushu University, Japan
Pierangela Samarati, Universita` degli Studi di Milano, Italy
R. Sekar, Stony Brook University, USA
Elaine Shi, PARC/UC Berkley, USA
Einar Snekkenes, Gjovik University College, Norway
Abhinav Srivastava, AT&T Labs – Research, USA
Carmela Troncoso, K.U. Leuven, Belgium
Yevgeniy Vahlis, AT&T, USA
Jaideep Vaidya, Rutgers University, USA
Michael Waidner, TU Darmstadt, Germany
Shouhai Xu, University of Texas at San Antonio, USA
Ting Yu, North Carolina State University, USA
Jianying Zhou, Institute for Infocomm Research, Singapore

This call for papers and additional information about the conference
can be found at http://www.iit.cnr.it/esorics2012/

Mar 06

17th European Symposium on Research in Computer Security (ESORICS 2012)

CALL FOR PAPERS

******************************************************************************
17th European Symposium on Research in Computer Security (ESORICS 2012)
Pisa, Italy — September 10-12, 2012
http://www.iit.cnr.it/esorics2012/
******************************************************************************

ESORICS is the annual European research event in Computer Security.
The Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the academic
and industrial communities.  Papers offering novel research contributions
in computer security are solicited for submission to the Symposium.
The primary focus is on original, high quality, unpublished research
and implementation experiences. We encourage submissions of
papers discussing industrial research and development.
Topics of interest include, but are not limited to:

– access control
– accountability
– ad hoc networks
– anonymity
– applied cryptography
– authentication
– biometrics
– database security
– data protection
– digital content protection
– digital forensic
– distributed systems security
– electronic payments
– embedded systems security
– inference control
– information hiding
– identity management
– information flow control
– integrity
– intrusion detection
– formal security methods
– language-based security
– network security
– phishing and spam prevention
– privacy
– risk analysis and management
– secure electronic voting
– security architectures
– security economics
– security metrics
– security models
– security and privacy in cloud scenarios
– security and privacy in complex systems
– security and privacy in location services
– security and privacy for mobile code
– security and privacy in pervasive/ubiquitous computing
– security and privacy policies
– security and privacy in social networks
– security and privacy in web services
– security verification
– software security
– steganography
– systems security
– trust models and management
– trustworthy user devices
– web security
– wireless security

PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. The proceedings will be published by
Springer in the the Lecture Notes in Computer Science series.
All submissions should follow the LNCS template
(http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0)
from the time they are submitted. Submitted papers should be
at most 16 pages (using 10-point font), excluding the bibliography and
well-marked appendices, and at most 20 pages total. Committee members
are not required to read the appendices, so the paper should be
intelligible without them. All submissions must be written in English.
Submissions are to be made to the submission web site at
http://www.easychair.org/conferences/?conf=esorics2012.
Only pdf files will be accepted. Submissions not meeting these guidelines
risk rejection without consideration of their merits.
Papers must be received by the deadline of March 31, 2012 (11:59 p.m.
American Samoa time). Authors of accepted papers must guarantee that
their papers will be presented at the conference.

IMPORTANT DATES
Paper submission due: March 31, 2012 (11:59 p.m. American Samoa time)
Notification to authors: June 10, 2012
Camera ready due: June 20, 2012

GENERAL CHAIR
Fabio Martinelli
National Research Council – CNR, Italy

PROGRAM CHAIRS
Sara Foresti
Universita` degli Studi di Milano, Italy

Moti Yung
Google Inc.,  USA

PUBLICITY CHAIR
Giovanni Livraga
Universita` degli Studi di Milano, Italy

PROGRAM COMMITTEE
Alessandro Armando, Universita` di Genova, Italy
Mikhail Atallah, Purdue University, USA
Michael Backes, Saarland University, Germany
David A. Basin, ETH Zurich, Switzerland
Kevin Bauer, University of Waterloo, Canada
Joachim Biskup, University of Dortmund, Germany
Marina Blanton, University of Notre Dame, USA
Carlo Blundo, Universita` degli Studi di Salerno, Italy
Srdjan Capkun, ETH Zurich, Switzerland
Liqun Chen, HP Labs, UK
Seung-Geol Choi, University of Maryland, USA
Veronique Cortier, LORIA, France
Jason Crampton, University of London, UK
Frederic Cuppens, Telecom Bretagne, France
Anupam Datta, Carnegie Mellon University, USA
Sabrina De Capitani di Vimercati, Univ. degli Studi di Milano, Italy
Claudia Diaz, K.U. Leuven, Belgium
Wenliang Du, Syracuse University, USA
Simon Foley, University College Cork, Ireland
Keith B. Frikken, Miami University, USA
Dieter Gollmann, TU Hamburg-Harburg, Germany
Dimitris Gritzalis, AUEB, Greece
Ryan Henry, University of Waterloo, Canada
Amir Herzberg, Bar-Ilan University, Israel
Sushil Jajodia, George Mason University, USA
Aaron Johnson, U.S. Naval Research Lab, USA
Stefan Katzenbeisser, TU Darmstadt, Germany
KwangJo Kim, KAIST, Korea
Markulf Kohlweiss, Microsoft Research, UK
Michiharu Kudo, IBM Tokyo Research Laboratory, Japan
Miroslaw Kutylowski, Wroclaw University of Technology, Poland
Adam J. Lee, Univeristy of Pittsburgh, USA
Wenke Lee, Georgia Institute of Technology, USA
Dongdai Lin, Chinese Academy of Sciences, China
Javier Lopez, University of Malaga, Spain
Wenjing Lou, Virginia Polytechnic Institute and State University, USA
John C. Mitchell, Stanford University, USA
Atsuko Miyaji, JAIST, Japan
David Naccache, ENS, France
Peng Ning, North Carolina State University, USA
Stefano Paraboschi, Universita` degli Studi di Bergamo, Italy
Guenther Pernul, University of Regensburg, Germany
Jean-Jacques Quisquater, UCL, Belgium
Indrakshi Ray, Colorado State University, USA
Kui Ren, Illinois Institute of Technology, USA
Peter Ryan, University of Luxembourg, Luxembourg
Ahmad-Reza Sadeghi, TU Darmstadt, Germany
Rei Safavi-Naini, University of Calgary, Canada
Kouichi Sakurai, Kyushu University, Japan
Pierangela Samarati, Universita` degli Studi di Milano, Italy
R. Sekar, Stony Brook University, USA
Elaine Shi, PARC/UC Berkley, USA
Einar Snekkenes, Gjovik University College, Norway
Abhinav Srivastava, AT&T Labs – Research, USA
Carmela Troncoso, K.U. Leuven, Belgium
Yevgeniy Vahlis, AT&T, USA
Jaideep Vaidya, Rutgers University, USA
Michael Waidner, TU Darmstadt, Germany
Shouhai Xu, University of Texas at San Antonio, USA
Ting Yu, North Carolina State University, USA
Jianying Zhou, Institute for Infocomm Research, Singapore

This call for papers and additional information about the conference
can be found at http://www.iit.cnr.it/esorics2012/

Mar 05

CFP 9th International Conference on Security and Cryptography (SECRYPT 2012)

CALL FOR PAPERS

************************************************************************
9th International Conference on Security and Cryptography (SECRYPT 2012)
Rome, Italy, July 24-27, 2012
http://secrypt.icete.org
************************************************************************

SECRYPT is an annual international conference covering research in
information and communication security.  The 9th International
Conference on Security and Cryptography (SECRYPT 2012) will be held in
Rome, Italy.  The conference seeks submissions from academia,
industry, and government presenting novel research on all theoretical
and practical aspects of data protection, privacy, security, and
cryptography.  Papers describing the application of security
technology, the implementation of systems, and lessons learned are
also encouraged.  The conference topics include, but are not limited
to:

– Access Control
– Applied Cryptography
– Authentication
– Biometrics Security and Privacy
– Critical Infrastructure Protection
– Data Integrity
– Data Protection
– Database Security and Privacy
– Digital Forensics
– Digital Rights Management
– Ethical and Legal Implications of Security and Privacy
– Formal Methods for Security
– Human Factors and Human Behaviour Recognition Techniques
– Identification, Authentication and Non-repudiation
– Identity Management
– Information Hiding
– Information Systems Auditing
– Insider Threats and Countermeasures
– Intellectual Property Protection
– Intrusion Detection & Prevention
– Management of Computing Security
– Network Security
– Organizational Security Policies
– Peer-to-Peer Security
– Personal Data Protection for Information Systems
– Privacy
– Privacy Enhancing Technologies
– Reliability and Dependability
– Risk Assessment
– Secure Cloud Computing
– Secure Software Development Methodologies
– Security Protocols
– Security and Privacy in Mobile Systems
– Security and Privacy in Complex Systems
– Security and Privacy in IT Outsourcing
– Security and Privacy in Location-based Services
– Security and Privacy in Pervasive/Ubiquitous Computing
– Security and Privacy in Social Networks
– Security and Privacy in Web Services
– Security and Privacy Policies
– Security Area Control
– Security Deployment
– Security Engineering
– Security for Grid Computing
– Security in Distributed Systems
– Security Information Systems Architecture and Design and Security
Patterns
– Security Management
– Security Metrics and Measurement
– Security Requirements (Threats, Vulnerabilities, Risk, Formal
Methods, etc.)
– Security Verification and Validation
– Sensor and Mobile Ad Hoc Network Security
– Service and Systems Design and QoS Network Security
– Software Security
– Trust Management and Reputation Systems
– Ubiquitous Computing Security
– Wireless Network Security (WiFi, WiMAX, WiMedia and others)

PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings.  All submissions should be appropriately
anonymized (i.e., papers should not contain author names or
affiliations, or obvious citations). Submissions are to be made to the
submission web site at http://www.insticc.org/Primoris.

Two categories of papers can be submitted:

– Full Paper: A full paper presents a work where the research is
completed or almost finished.  Authors of regular submitted papers
will indicate at the time of submission whether they would like
their paper to also be considered for publication as a position
paper.
– Position Paper: A position paper presents results that are
preliminary or that simply require few pages to describe. A position
paper may be a short report and discussion of ideas, facts,
situations, methods, procedures, or results of scientific research
(bibliographic, experimental, theoretical, or other) focused on one
of the conference topics. The acceptance of a position paper is
restricted to the categories of “short paper” or “poster”.

Submitted papers must be formatted according to the SECRYPT format
(with the exception that authors should be blinded in the submission),
which is described at http://secrypt.icete.org/paper_formats.asp.
Submission page limit is 10 pages for full paper and 6 pages for position papers.
Accepted papers will be subject to the limit of: 10 pages (for full papers), 6
pages (for short papers), and 4 pages (for posters).  Submitted papers
will be subject to a double-blind review process.  All submissions
should be anonymized. All accepted papers/posters will be published in
the conference proceedings.  A short list of presented papers will be
selected so that revised and extended versions of these papers will be
published by Springer-Verlag in a CCIS Series book.  Authors of
accepted papers/posters must guarantee that their papers/posters will be
presented at the conference.

IMPORTANT DATES
Full Paper submission: March 19, 2012
Authors Notification (full papers): May 4, 2012
Final Full Paper Submission and Registration: May 14, 2012

CONFERENCE CHAIR
Mohammad S. Obaidat, Monmouth University, U.S.A.

PROGRAM CHAIR
Pierangela Samarati, Universita’ degli Studi di Milano, Italy

PROGRAM CO-CHAIRS
Wenjing Lou, Virginia Polytechnic Institute and State University, United States
Jianying Zhou, Institute For Infocomm Research, Singapore

PROGRAM COMMITTEE
Claudio Ardagna, Universita` degli Studi di Milano, Italy
Ken Barker, University of Calgary, Canada
Carlo Blundo, Università di Salerno,, Italy
David Chadwick, University of Kent ,United Kingdom
Aldar Chan, Institute for Infocomm Researc,h Singapore
Ee-chien Chang, National University of Singapore Singapore
Yingying Chen, Stevens Institute of Technology,, United States
Cheng-Kang Chu, Institute for Infocomm Research, Singapore
Marco Cova, University of Birmingham,, United Kingdom
Jorge Cuellar, Siemens AG,, Germany
Frédéric Cuppens, Ecole Nationale de Télécommunications de Bretagne,, France
Reza Curtmola,  New Jersey Institute of Tech,, United States
Ricardo Dahab, University of Campinas (UNICAMP) ,, Brazil
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Roberto Di Pietro, Universita’ di Roma Tre,, Italy
Tassos Dimitriou, Athens Information Technology,, Greece
Josep Domingo-ferrer, Rovira I Virgili University of Tarragona, Spain
Eduardo B. Fernandez, Florida Atlantic University, United States
Eduardo Fernández-medina, University of Castilla-La Mancha, Spain
Alberto Ferrante, University of Lugano, Switzerland
Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain
Simone Fischer-Hübner, Karlstad University, Sweden
Sara Foresti, Universita’ degli Studi di Milano, Italy
Keith Frikken, Miami University of Ohio, United States
Steven Furnell, University of Plymouth, United Kingdom
Mark Gondree, Naval Postgraduate School, United States
Dimitris Gritzalis, AUEB, Greece
Yong Guan, Iowa State University, United States
Xinyi Huang, Fujian Normal University, China
Michael Huth, Imperial College London, United Kingdom
Cynthia Irvine, Naval Postgraduate School, United States
Sokratis Katsikas, University of Piraeus, Greece
Stefan Katzenbeisser, Technische Universität Darmstadt, Germany
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan
Costas Lambrinoudakis, University of Piraeus, Greece
Bo Lang Beijing, University of Aeronautics and Astronautics, China
Loukas Lazos,  University of Arizona, United States
Adam J. Lee,  University of Pittsburgh, United States
Patrick Lee,  Chinese University of Hong Kong Hong Kong
Albert Levi, Sabanci University, Turkey
Jiguo Li, Hohai University, China
Ming Li, Utah State University, United States
Giovanni Livraga, Universita degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Emil Lupu, Imperial College, United Kingdom
Luigi Mancini, University of Rome La Sapienza, Italy
Olivier Markowitch, Université Libre de Bruxelles, Belgium
Vashek Matyas, Masaryk University Czech Republic
Carlos Maziero, UTFPR – Federal University of Technology – Paraná state, Brazil
Chris Mitchell, Royal Holloway, University of London, United Kingdom
Atsuko Miyaji, Japan Advaned Institute of Science and Technology, Japan
Marco Casassa-Mont, Hewlett-Packard Laboratories, United Kingdom
David Naccache, Ecole Normale Superieure, France
Guevara Noubir,  Northeastern University, United States
Eiji Okamoto, University of Tsukuba, Japan
Rolf Oppliger, eSECURITY Technologies, Switzerland
Stefano Paraboschi, University of Bergamo, Italy
Gerardo Pelosi, Politecnico di Milano, Italy
Günther Pernul, University of Regensburg, Germany
Raphael C.-w. Phan, Loughborough University, United Kingdom
Radha Poovendran,  University of Washington, United States
Joachim Posegga, Institute of IT Security and Security Law, Germany
Kui Ren, Illinois Institute of Technology, United States
Jian Ren, Michigan State University, United States
Sushmita Ruj, University of Ottawa Canada
Gokay Saldamli Bogazici, University MIS department, Turkey
Martin Schläffer, Graz University of Technology, Austria
Miguel Soriano, UPC, Spain
Cosimo Stallo, University of Rome Tor Vergata, Italy
Neeraj Suri, Technische Universität Darmstadt, Germany
Willy Susilo, University of Wollongong, Australia
Chiu Tan, Temple University, United States
Juan Tapiador, Universidad Carlos III de Madrid, Spain
Wen-guey Tzeng, National Chiao Tung University, Taiwan
Guilin Wang, University of Wollongong, Australia
Xinyuan (Frank) Wang, George Mason University , United States
Haining  Wang, The College of William and Mary, United States
Lingyu Wang, Concordia University Canada
Osman Yagan, Carnegie Mellon University, United States
Danfeng Yao, Virginia Tech, United States
Alec Yasinsac, University of South Alabama, United States
Shucheng Yu, University of Arkansas at Little Rock, United States
Wensheng Zhang, Iowa State University, United States
Futai Zhang, Nanjing Normal University, China
Wen Tao Zhu, Graduate University of Chinese Academy of Sciences, China

This call for papers and additional information about the conference
can be found at http://secrypt.icete.org/

For any questions, please contact the program chairs:
secrypt2012@unimi.it

———————————————–

SECRYPT 2012 is part of the International Joint Conference on e-Business and
Telecommunications (ICETE 2012) that has 5 more conferences with very strong synergies between them, namely:

– DCNET: Int’l Conference on Data Communication Networking (http://www.dcnet.icete.org)
– ICE-B: Int’l Conference on e-Business (http://www.ice-b.icete.org)
– OPTICS: Int’l Conference on Optical Communication Systems (http://www.optics.icete.org)
– SIGMAP: Int’l Conference on Signal Processing and Multimedia Applications (http://www.sigmap.icete.org)
– WINSYS: Int’l Conference on Wireless Information Networks and Systems (http://www.winsys.icete.org)

The conference program features a number of Keynote Lectures to be delivered by
distinguished world-class researchers, namely:
– Venu Govindaraju, University at Buffalo, United States
– Sushil Jajodia, George Mason University Fairfax, United States
– Andreas Holzinger, Medical University Graz, Austria
– Geoffrey Charles Fox, Indiana University, United States
http://www.icete.org/KeynoteSpeakers.aspx

Feb 14

17th European Symposium on Research in Computer Security (ESORICS 2012) Pisa, Italy — September 10-12, 2012

CALL FOR PAPERS

******************************************************************************
17th European Symposium on Research in Computer Security (ESORICS 2012)
Pisa, Italy — September 10-12, 2012
http://www.iit.cnr.it/esorics2012/
******************************************************************************

ESORICS is the annual European research event in Computer Security.
The Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the academic
and industrial communities.  Papers offering novel research contributions
in computer security are solicited for submission to the Symposium.
The primary focus is on original, high quality, unpublished research
and implementation experiences. We encourage submissions of
papers discussing industrial research and development.
Topics of interest include, but are not limited to:

– access control
– accountability
– ad hoc networks
– anonymity
– applied cryptography
– authentication
– biometrics
– database security
– data protection
– digital content protection
– digital forensic
– distributed systems security
– electronic payments
– embedded systems security
– inference control
– information hiding
– identity management
– information flow control
– integrity
– intrusion detection
– formal security methods
– language-based security
– network security
– phishing and spam prevention
– privacy
– risk analysis and management
– secure electronic voting
– security architectures
– security economics
– security metrics
– security models
– security and privacy in cloud scenarios
– security and privacy in complex systems
– security and privacy in location services
– security and privacy for mobile code
– security and privacy in pervasive/ubiquitous computing
– security and privacy policies
– security and privacy in social networks
– security and privacy in web services
– security verification
– software security
– steganography
– systems security
– trust models and management
– trustworthy user devices
– web security
– wireless security

PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. The proceedings will be published by
Springer in the the Lecture Notes in Computer Science series.
All submissions should follow the LNCS template
(http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0)
from the time they are submitted. Submitted papers should be
at most 16 pages (using 10-point font), excluding the bibliography and
well-marked appendices, and at most 20 pages total. Committee members
are not required to read the appendices, so the paper should be
intelligible without them. All submissions must be written in English.
Submissions are to be made to the submission web site at
http://www.easychair.org/conferences/?conf=esorics2012.
Only pdf files will be accepted. Submissions not meeting these guidelines
risk rejection without consideration of their merits.
Papers must be received by the deadline of March 31, 2012.
Authors of accepted papers must guarantee that their papers will be
presented at the conference.

IMPORTANT DATES
Paper submission due: March 31, 2012
Notification to authors: June 10, 2012
Camera ready due: June 20, 2012

GENERAL CHAIR
Fabio Martinelli
National Research Council – CNR, Italy

PROGRAM CHAIRS
Sara Foresti
Universita` degli Studi di Milano, Italy

Moti Yung
Google Inc.,  USA

PUBLICITY CHAIR
Giovanni Livraga
Universita` degli Studi di Milano, Italy

PROGRAM COMMITTEE
Alessandro Armando, Universita` di Genova, Italy
Mikhail Atallah, Purdue University, USA
Michael Backes, Saarland University, Germany
David A. Basin, ETH Zurich, Switzerland
Kevin Bauer, University of Waterloo, Canada
Joachim Biskup, University of Dortmund, Germany
Marina Blanton, University of Notre Dame, USA
Carlo Blundo, Universita` degli Studi di Salerno, Italy
Srdjan Capkun, ETH Zurich, Switzerland
Liqun Chen, HP Labs, UK
Seung-Geol Choi, University of Maryland, USA
Veronique Cortier, LORIA, France
Jason Crampton, University of London, UK
Frederic Cuppens, Telecom Bretagne, France
Anupam Datta, Carnegie Mellon University, USA
Sabrina De Capitani di Vimercati, Univ. degli Studi di Milano, Italy
Claudia Diaz, K.U. Leuven, Belgium
Wenliang Du, Syracuse University, USA
Simon Foley, University College Cork, Ireland
Keith B. Frikken, Miami University, USA
Dieter Gollmann, TU Hamburg-Harburg, Germany
Dimitris Gritzalis, AUEB, Greece
Ryan Henry, University of Waterloo, Canada
Amir Herzberg, Bar-Ilan University, Israel
Sushil Jajodia, George Mason University, USA
Aaron Johnson, U.S. Naval Research Lab, USA
Stefan Katzenbeisser, TU Darmstadt, Germany
KwangJo Kim, KAIST, Korea
Markulf Kohlweiss, Microsoft Research, UK
Michiharu Kudo, IBM Tokyo Research Laboratory, Japan
Miroslaw Kutylowski, Wroclaw University of Technology, Poland
Adam J. Lee, Univeristy of Pittsburgh, USA
Wenke Lee, Georgia Institute of Technology, USA
Dongdai Lin, Chinese Academy of Sciences, China
Javier Lopez, University of Malaga, Spain
Wenjing Lou, Virginia Polytechnic Institute and State University, USA
John C. Mitchell, Stanford University, USA
Atsuko Miyaji, JAIST, Japan
David Naccache, ENS, France
Peng Ning, North Carolina State University, USA
Stefano Paraboschi, Universita` degli Studi di Bergamo, Italy
Guenther Pernul, University of Regensburg, Germany
Jean-Jacques Quisquater, UCL, Belgium
Indrakshi Ray, Colorado State University, USA
Kui Ren, Illinois Institute of Technology, USA
Peter Ryan, University of Luxembourg, Luxembourg
Ahmad-Reza Sadeghi, TU Darmstadt, Germany
Rei Safavi-Naini, University of Calgary, Canada
Kouichi Sakurai, Kyushu University, Japan
Pierangela Samarati, Universita` degli Studi di Milano, Italy
R. Sekar, Stony Brook University, USA
Elaine Shi, PARC/UC Berkley, USA
Einar Snekkenes, Gjovik University College, Norway
Abhinav Srivastava, AT&T Labs – Research, USA
Carmela Troncoso, K.U. Leuven, Belgium
Yevgeniy Vahlis, AT&T, USA
Jaideep Vaidya, Rutgers University, USA
Michael Waidner, TU Darmstadt, Germany
Shouhai Xu, University of Texas at San Antonio, USA
Ting Yu, North Carolina State University, USA
Jianying Zhou, Institute for Infocomm Research, Singapore

This call for papers and additional information about the conference
can be found at http://www.iit.cnr.it/esorics2012/

Feb 10

International Conference on Applied Cryptography and Network Security (ACNS 2012)

10th International Conference on
Applied Cryptography and Network Security (ACNS 2012)
Singapore, June 26-29, 2012
http://icsd.i2r.a-star.edu.sg/acns2012

Paper submission due: February 12, 2012 (11:59PM American Samoa time)

The 10th International Conference on Applied Cryptography and Network
Security (ACNS 2012) will be held in Singapore. The conference seeks
submissions from academia, industry, and government presenting novel
research on all aspects of applied cryptography as well as network
security and privacy. Papers describing novel paradigms, original
directions, or non-traditional perspectives are also encouraged.
The conference has two tracks: a research track and an industry
track. Topics of interest include, but are not limited to:

– Access control
– Applied cryptography
– Automated  protocols analysis
– Biometric security and privacy
– Complex systems security
– Critical infrastructure protection
– Cryptographic primitives and protocols
– Data protection
– Database and system security
– Digital rights management
– Email and web security
– Identity management
– Intellectual property protection
– Internet fraud
– Intrusion detection and prevention
– Key management
– Malware
– Network security protocols
– Privacy, anonymity, and untraceability
– Privacy-enhancing technology
– Protection for the future Internet
– Secure mobile agents and mobile code
– Security in e-commerce
– Security in P2P systems
– Security in pervasive/ubiquitous computing
– Security and privacy in cloud and grid systems
– Security and privacy in distributed systems
– Security and privacy in smart grids
– Security and privacy in wireless networks
– Security and privacy metrics
– Trust management
– Usability and security

SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have
been published or that are simultaneously submitted to a journal
or a conference with proceedings. All submissions should be
appropriately anonymized (i.e., papers should not contain author
names or affiliations, or obvious citations). Submissions should
be at most 18 pages for research track and at most 8 pages for
industry track, including the bibliography and well-marked
appendices, and should follow the LNCS style. Submissions are
to be made to the submission web site at
http://www.easychair.org/account/signin.cgi?conf=acns2012.
Only pdf files will be accepted. Submissions not meeting these
guidelines risk rejection without consideration of their merits.
Papers must be received by the deadline of February 5, 2012
(11:59 p.m. Samoa time). Authors should indicate whether their
submission should be considered for the best student paper award;
any paper co-authored by at least a full time student is eligible.
Authors of accepted papers must guarantee that their papers will
be presented at the conference. Papers accepted for the research
track will be published in proceedings published by Springer’s LNCS
and available at the conference. Extended versions of selected best
papers will be invited for a special issue on the Journal of
Computer Security.

IMPORTANT DATES
Paper submission due: February 5, 2012 (11:59PM American Samoa time)
Notification to authors: April 10, 2012
Camera ready due: April 24, 2012

GENERAL CHAIR
Jianying Zhou
I2R, Singapore

PROGRAM CHAIRS
Feng Bao
I2R, Singapore

Pierangela Samarati
Universita` degli Studi di Milano, Italy

ORGANIZING CHAIR
Shen-Tat Goh
I2R, Singapore

PUBLICITY CHAIRS
Xinyi Huang
I2R, Singapore

Giovanni Livraga
Universita` degli Studi di Milano, Italy

PROGRAM COMMITTEE
Michel Abdalla      (ENS, France)
Vijay Atluri        (Rutgers University, USA)
Lucas Ballard       (Google, USA)
Paulo Barreto       (University of Sao Paulo, Brazil)
Lujo Bauer          (Carnegie Mellon University, USA)
Marina Blanton      (University of Notre Dame, USA)
Carlo Blundo        (Universita’ degli Studi di Salerno, Italy)
Levente Buttyan     (Budapest Uni of Technology and Economics, Hungary)
Roy Campbell        (University of Illinois at Urbana-Champaign, USA)
Liqun Chen          (HP Labs, UK)
Chen-Mou Cheng      (National Taiwan University, Taiwan)
Jung Hee Cheon      (Seoul National University, Korea)
Sherman S.M. Chow   (University of Waterloo, Canada)
Sabrina De Capitani di Vimercati (Universita’ degli Studi di Milano, Italy)
Robert Deng         (Singapore Management University, Singapore)
Roberto Di Pietro   (Universita’ di Roma Tre, Italy)
Xuhua Ding          (Singapore Management University, Singapore)
Kevin Du            (Syracuse University, USA)
Wu-Chang Feng       (Portland State University, USA)
Sara Foresti        (Universita’ degli Studi di Milano, Italy)
Keith Frikken       (Miami University, USA)
Rosario Gennaro     (IBM Research, USA)
Dieter Gollmann     (Hamburg University of Technology, Germany)
Stefanos Gritzalis  (University of the Aegean, Greece)
Dawu Gu             (Shanghai Jiaotong University, China)
Guofei Gu           (Texas A&M University, USA)
Sushil Jajodia      (George Mason University, USA)
Stanislaw Jarecki   (University of California Irvine, USA)
Aaron Johnson       (Naval Research Laboratory, USA)
Angelos Keromytis   (Columbia University, USA)
Steve Kremer        (INRIA Nancy, France)
Ralf Kuesters       (University of Trier, Germany)
Miroslaw Kutylowski (Wroclaw University of Technology, Poland)
Adam J. Lee         (University of Pittsburgh, USA)
Hui Li              (Xidian University, China)
Zhenkai Liang       (National University of Singapore, Singapore)
Benoit Libert       (Universite Catholique de Louvain, Belgium)
Peng Liu            (Penn State University, USA)
Michael Locasto     (University of Calgary, Canada)
Javier Lopez        (University of Malaga, Spain)
Mark Manulis        (TU Darmstadt, Germany)
Atsuko Miyaji       (JAIST, Japan)
Refik Molva         (EURECOM, France)
Yi Mu               (University of Wollongong, Australia)
Peng Ning           (North Carolina State University, USA)
Elisabeth Oswald    (University of Bristol, UK)
Vincent Rijmen      (Katholieke Universiteit Leuven, Belgium)
Matt Robshaw        (Orange Labs, France)
Radu Sion           (Stony Brook University, USA)
Neeraj Suri         (TU Darmstadt, Germany)
Willy Susilo        (University of Wollongong, Australia)
Tsuyoshi Takagi     (Kyushu University, Japan)
Vrizlynn Thing      (Institute for Infocomm Research, Singapore)
Jaideep Vaidya      (Rutgers University, USA)
Michael Waidner     (Fraunhofer, Germany)
Haining Wang        (College of William and Mary, USA)
Steve Weis          (AppDirect, USA)
Duncan Wong         (City University of Hong Kong, China)
Avishai Wool        (Tel Aviv University, Israel)
Shouhuai Xu         (University of Texas at San Antonio, USA)
Yanjiang Yang       (Institute for Infocomm Research, Singapore)
Danfeng Yao         (Virginia Tech, USA)
Moti Yung           (Google, USA)

This call for papers and additional information about the
conference can be found at http://icsd.i2r.a-star.edu.sg/acns2012

The history and statistics of ACNS can be found at ACNS Home
— http://icsd.i2r.a-star.edu.sg/staff/jianying/acns_home/

ACNS forum at LinkedIn —
http://www.linkedin.com/groups/ACNS-Applied-Cryptography-Network-Security-4290836

Feb 02

MPs warn of rise of identity-stealing bank-robbing malware | Naked Security

MPs warn of rise of identity-stealing bank-robbing malware | Naked Security.

Feb 01

9th International Conference on Security and Cryptography (SECRYPT 2012)

CALL FOR PAPERS

************************************************************************
9th International Conference on Security and Cryptography (SECRYPT 2012)
Rome, Italy, July 24-27, 2012
http://secrypt.icete.org
************************************************************************

SECRYPT is an annual international conference covering research in
information and communication security.  The 9th International
Conference on Security and Cryptography (SECRYPT 2012) will be held in
Rome, Italy.  The conference seeks submissions from academia,
industry, and government presenting novel research on all theoretical
and practical aspects of data protection, privacy, security, and
cryptography.  Papers describing the application of security
technology, the implementation of systems, and lessons learned are
also encouraged.  The conference topics include, but are not limited
to:

– Access Control
– Applied Cryptography
– Authentication
– Biometrics Security and Privacy
– Critical Infrastructure Protection
– Data Integrity
– Data Protection
– Database Security and Privacy
– Digital Forensics
– Digital Rights Management
– Ethical and Legal Implications of Security and Privacy
– Formal Methods for Security
– Human Factors and Human Behaviour Recognition Techniques
– Identification, Authentication and Non-repudiation
– Identity Management
– Information Hiding
– Information Systems Auditing
– Insider Threats and Countermeasures
– Intellectual Property Protection
– Intrusion Detection & Prevention
– Management of Computing Security
– Network Security
– Organizational Security Policies
– Peer-to-Peer Security
– Personal Data Protection for Information Systems
– Privacy
– Privacy Enhancing Technologies
– Reliability and Dependability
– Risk Assessment
– Secure Cloud Computing
– Secure Software Development Methodologies
– Security Protocols
– Security and Privacy in Mobile Systems
– Security and Privacy in Complex Systems
– Security and Privacy in IT Outsourcing
– Security and Privacy in Location-based Services
– Security and Privacy in Pervasive/Ubiquitous Computing
– Security and Privacy in Social Networks
– Security and Privacy in Web Services
– Security and Privacy Policies
– Security Area Control
– Security Deployment
– Security Engineering
– Security for Grid Computing
– Security in Distributed Systems
– Security Information Systems Architecture and Design and Security
 Patterns
– Security Management
– Security Metrics and Measurement
– Security Requirements (Threats, Vulnerabilities, Risk, Formal
 Methods, etc.)
– Security Verification and Validation
– Sensor and Mobile Ad Hoc Network Security
– Service and Systems Design and QoS Network Security
– Software Security
– Trust Management and Reputation Systems
– Ubiquitous Computing Security
– Wireless Network Security (WiFi, WiMAX, WiMedia and others) 

PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings.  All submissions should be appropriately
anonymized (i.e., papers should not contain author names or
affiliations, or obvious citations). Submissions are to be made to the
submission web site at http://www.insticc.org/Primoris.

Two categories of papers can be submitted: 

– Full Paper: A full paper presents a work where the research is
 completed or almost finished.  Authors of regular submitted papers
 will indicate at the time of submission whether they would like
 their paper to also be considered for publication as a position
 paper.
– Position Paper: A position paper presents results that are
 preliminary or that simply require few pages to describe. A position
 paper may be a short report and discussion of ideas, facts,
 situations, methods, procedures, or results of scientific research
 (bibliographic, experimental, theoretical, or other) focused on one
 of the conference topics. The acceptance of a position paper is
 restricted to the categories of "short paper" or "poster".

Submitted papers must be formatted according to the SECRYPT format
(with the exception that authors should be blinded in the submission), 
which is described at http://secrypt.icete.org/paper_formats.asp.  
Submission page limit is 10 pages for full paper and 6 pages for position papers. 
Accepted papers will be subject to the limit of: 10 pages (for full papers), 6
pages (for short papers), and 4 pages (for posters).  Submitted papers
will be subject to a double-blind review process.  All submissions
should be anonymized. All accepted papers/posters will be published in
the conference proceedings.  A short list of presented papers will be
selected so that revised and extended versions of these papers will be
published by Springer-Verlag in a CCIS Series book.  Authors of
accepted papers/posters must guarantee that their papers/posters will be
presented at the conference.


IMPORTANT DATES
Full Paper submission: March 5, 2012
Authors Notification (full papers): May 4, 2012 
Final Full Paper Submission and Registration: May 14, 2012

CONFERENCE CHAIR
Mohammad S. Obaidat, Monmouth University, U.S.A.

PROGRAM CHAIR
Pierangela Samarati, Universita' degli Studi di Milano, Italy 

PROGRAM CO-CHAIRS
Wenjing Lou, Virginia Polytechnic Institute and State University, United States
Jianying Zhou, Institute For Infocomm Research, Singapore


PROGRAM COMMITTEE
Claudio Ardagna, Universita` degli Studi di Milano, Italy
Ken Barker, University of Calgary, Canada
Carlo Blundo, Università di Salerno,, Italy
David Chadwick, University of Kent ,United Kingdom
Aldar Chan, Institute for Infocomm Researc,h Singapore
Ee-chien Chang, National University of Singapore Singapore
Yingying Chen, Stevens Institute of Technology,, United States
Cheng-Kang Chu, Institute for Infocomm Research, Singapore
Marco Cova, University of Birmingham,, United Kingdom
Jorge Cuellar, Siemens AG,, Germany
Frédéric Cuppens, Ecole Nationale de Télécommunications de Bretagne,, France
Reza Curtmola,  New Jersey Institute of Tech,, United States
Ricardo Dahab, University of Campinas (UNICAMP) ,, Brazil
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Roberto Di Pietro, Universita' di Roma Tre,, Italy
Tassos Dimitriou, Athens Information Technology,, Greece
Josep Domingo-ferrer, Rovira I Virgili University of Tarragona, Spain
Eduardo B. Fernandez, Florida Atlantic University, United States
Eduardo Fernández-medina, University of Castilla-La Mancha, Spain
Alberto Ferrante, University of Lugano, Switzerland
Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain
Simone Fischer-Hübner, Karlstad University, Sweden
Sara Foresti, Universita' degli Studi di Milano, Italy
Keith Frikken, Miami University of Ohio, United States
Steven Furnell, University of Plymouth, United Kingdom
Mark Gondree, Naval Postgraduate School, United States
Dimitris Gritzalis, AUEB, Greece
Yong Guan, Iowa State University, United States
Xinyi Huang, Fujian Normal University, China
Michael Huth, Imperial College London, United Kingdom
Cynthia Irvine, Naval Postgraduate School, United States
Sokratis Katsikas, University of Piraeus, Greece
Stefan Katzenbeisser, Technische Universität Darmstadt, Germany
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan
Costas Lambrinoudakis, University of Piraeus, Greece
Bo Lang Beijing, University of Aeronautics and Astronautics, China
Loukas Lazos,  University of Arizona, United States
Adam J. Lee,  University of Pittsburgh, United States
Patrick Lee,  Chinese University of Hong Kong Hong Kong
Albert Levi, Sabanci University, Turkey
Jiguo Li, Hohai University, China
Ming Li, Utah State University, United States
Giovanni Livraga, Universita degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Emil Lupu, Imperial College, United Kingdom
Luigi Mancini, University of Rome La Sapienza, Italy
Olivier Markowitch, Université Libre de Bruxelles, Belgium
Vashek Matyas, Masaryk University Czech Republic
Carlos Maziero, UTFPR – Federal University of Technology – Paraná state, Brazil
Chris Mitchell, Royal Holloway, University of London, United Kingdom
Atsuko Miyaji, Japan Advaned Institute of Science and Technology, Japan
Marco Casassa-Mont, Hewlett-Packard Laboratories, United Kingdom
David Naccache, Ecole Normale Superieure, France
Guevara Noubir,  Northeastern University, United States
Eiji Okamoto, University of Tsukuba, Japan
Rolf Oppliger, eSECURITY Technologies, Switzerland
Stefano Paraboschi, University of Bergamo, Italy
Gerardo Pelosi, Politecnico di Milano, Italy
Günther Pernul, University of Regensburg, Germany
Raphael C.-w. Phan, Loughborough University, United Kingdom
Radha Poovendran,  University of Washington, United States
Joachim Posegga, Institute of IT Security and Security Law, Germany
Kui Ren, Illinois Institute of Technology, United States
Jian Ren, Michigan State University, United States
Sushmita Ruj, University of Ottawa Canada
Gokay Saldamli Bogazici, University MIS department, Turkey
Martin Schläffer, Graz University of Technology, Austria
Miguel Soriano, UPC, Spain
Cosimo Stallo, University of Rome Tor Vergata, Italy
Neeraj Suri, Technische Universität Darmstadt, Germany
Willy Susilo, University of Wollongong, Australia
Chiu Tan, Temple University, United States
Juan Tapiador, Universidad Carlos III de Madrid, Spain
Wen-guey Tzeng, National Chiao Tung University, Taiwan
Guilin Wang, University of Wollongong, Australia
Xinyuan (Frank) Wang, George Mason University , United States
Haining  Wang, The College of William and Mary, United States
Lingyu Wang, Concordia University Canada
Osman Yagan, Carnegie Mellon University, United States
Danfeng Yao, Virginia Tech, United States
Alec Yasinsac, University of South Alabama, United States
Shucheng Yu, University of Arkansas at Little Rock, United States
Wensheng Zhang, Iowa State University, United States
Futai Zhang, Nanjing Normal University, China
Wen Tao Zhu, Graduate University of Chinese Academy of Sciences, China

This call for papers and additional information about the conference
can be found at http://secrypt.icete.org/

For any questions, please contact the program chairs:
secrypt2012@unimi.it

———————————————–

SECRYPT 2012 is part of the International Joint Conference on e-Business and 
Telecommunications (ICETE 2012) that has 5 more conferences with very strong synergies between them, namely:

– DCNET: Int'l Conference on Data Communication Networking (http://www.dcnet.icete.org)
– ICE-B: Int'l Conference on e-Business (http://www.ice-b.icete.org)
– OPTICS: Int'l Conference on Optical Communication Systems (http://www.optics.icete.org)
– SIGMAP: Int'l Conference on Signal Processing and Multimedia Applications (http://www.sigmap.icete.org)
– WINSYS: Int'l Conference on Wireless Information Networks and Systems (http://www.winsys.icete.org)

The conference program features a number of Keynote Lectures to be delivered by 
distinguished world-class researchers, namely:
– Venu Govindaraju, University at Buffalo, United States
– Sushil Jajodia, George Mason University Fairfax, United States
– Andreas Holzinger, Medical University Graz, Austria
(list not yet complete)
http://www.icete.org/KeynoteSpeakers.aspx

Feb 01

TrustID 2012 : The 2nd IEEE International Symposium on Trust and Identity in Mobile Internet, Computing and Communications

When Jun 25, 2012 – Jun 27, 2012
Where Liverpool, UK
Submission Deadline Mar 30, 2012
Notification Due Apr 20, 2012
Final Version Due May 8, 2012
TrustID 2012 : The 2nd IEEE International Symposium on Trust and Identity in Mobile Internet, Computing and Communications.

Jan 05

IFIP SEC 2012 – Deadline extended to January 17, 2012


* Deadline extended to January 17, 2012 (22:00 UTC) *

**********************************************************************
27th IFIP International Information Security and Privacy Conference 
(SEC 2012)
Creta Maris Hotel, Heraklion, Crete, Greece – June 4-6, 2012
http://www.sec2012.org
**********************************************************************

CONFERENCE TOPICS
Papers offering novel research contributions in any aspect of computer
security are solicited for submission to the 27th IFIP International 
Information Security and Privacy Conference. The focus is on original,
high quality, unpublished research and implementation experiences.
Submitted papers must not substantially overlap with papers that have
been published or that are simultaneously submitted to a journal or a
conference with proceedings. We encourage submissions of papers 
discussing industrial research and development. Papers should focus 
on topics which include, but are not limited to, the following:

– Access Control
– Accountability
– Anonymity
– Applied Cryptography
– Attacks & Malicious Code
– Authentication & Delegation
– Awareness & Education
– Data Integrity 
– Database Security
– Identity Management
– Information Security Culture
– Formal Security Verification
– Mobile Code Security
– Policies & Standards
– Privacy Attitudes & Practices
– Risk Analysis & Management
– Security Architectures
– Security Economics
– Security in Location Services
– Security in Social Networks
– Security Models
– Social Engineering & other Human-related Risks
– System Security
– Usable Security
– Trust Models & Management
– Trust Theories
– Trustworthy User Devices

After the conference, extended versions of selected papers will 
be considered for publication in a major security-focused journal. 
Those papers will undergo at least another review round.


INSTRUCTIONS FOR PAPER SUBMISSION
The proceedings will be published by Springer in the IFIP Advances 
in ICT Series. All submissions should follow the proper template 
from the time they are submitted. They should be not more than 
12 pages (using 11-point font), including bibliography and 
appendices. PC members are not required to read the appendices, 
so the paper should be intelligible without them. 
All submissions must be written in English.

Authors must submit their papers by the deadline indicated below, 
using the conference web site (www.sec2012.org) and following the 
requirements stated therein.

All accepted papers must be presented at the conference. Their 
authors must be prepared to sign a copyright transfer statement. 
At least one author of each accepted paper must register to the 
conference by the early date indicated by the organizers, and 
present the paper.


IMPORTANT DATES
Submission of papers: January 17, 2012 (22:00 UTC) *extended*
Notification to authors: March 1, 2012
Camera-ready version: March 10, 2012


CONFERENCE GENERAL CHAIR
S. Katsikas, University of Piraeus (GR)

PROGRAM COMMITTEE CHAIRS
D. Gritzalis, AUEB (GR)
S. Furnell, Plymouth University (UK)

PROGRAM COMMITTEE
V. Atluri, Rutgers University (US)
J. Biskup, University of Dortmund (DE)
J. Camenisch, IBM Research (CH)
S. De Capitani di Vimercati, U. degli Studi di Milano (IT)
N. Clarke, Plymouth University (UK)
J. Crume, IBM (US)
F. Cuppens, TELECOM Bretagne (FR)
N. Cuppens, UEB (FR)
B. de Decker, K.U. Leuven (BE)
G. Dhillon, Virginia C/wealth University (US)
T. Dimitrakos, BT (UK)
R. Dodge, US Military Academy (US)
S. Fischer-Huebner, Karlstadt University (SE)
D. Gollmann, Hamburg Univ. of Technology (DE)
J.-H. Hoepman, TNO & Radboud U. Nijmegen (NL)
T. Holz, Ruhr-University Bochum (DE)
S. Ioannidis, FORTH (GR)
B. Jacobs, Radboud Univ. Nijmegen (NL)
S. Jajodia, George Mason University (US)
L. Janczewski, Univ. of Auckland (NZ)
T. Karygiannis, NIST (US)
V. Katos, University of Thrace (GR)
P. Katsaros, University of Thessaloniki (GR)
S. Katzenbeisser, T.U. Darmstadt (DE)
D. Kesdogan, University of Siegen (DE)
C. Lambrinoudakis, Univ. of Piraeus (GR)
C. Landwehr, Univ. of Maryland (US)
R. E. Leenes, Tilburg University (NL)
J. Lopez, University of Malaga (ES)
E. Markatos, FORTH and Univ. of Crete (GR)
S. Marsh, Communications Research Center (CA)
I. Mavridis, University of Macedonia (GR)
N. Miloslavskaya, National Nuclear Research University (RU)
Y. Murayama, Iwate Prefectural University (JP)
E. Okamoto, Univ. of Tsukuba (JP)
M. Olivier, University of Pretoria (SA)
O. Ouzounis, ENISA (EU)
J. I. Pagter, Alexandra Instituttet, (DK)
M. Papadaki, Plymouth University (UK)
M. Pattinson, University of Adelaide (AU)
P. Peleties, USB Bank (CY)
H. Pohl, UAS Bonn-Rhein-Sieg (DE)
S. Qing, Chinese Academy of Sciences (CN)
M. Rajarajan, City University (UK)
K. Rannenberg, Goethe Univ. Frankfurt (DE)
C. Rieder, HSW Luzern (CH)
P. Samarati, Univ. degli Studi di Milano (IT)
R. Sasaki, Tokyo Denki University (JP)
I. Schaumuller-Bichl, UAS Hagenberg (AT)
A. K. Seip, Finanstilsynet (NO)
R. von Solms, NMMU (SA)
T. Tryfonas, University of Bristol (UK)
C. Valli, Edith Cowan University (AU)
J. Vyskoc, VaF (SK)
J. Ward, Hewlett Packard (UK)
T. Welzer, Univ. of Maribor (SI)
D. Westhoff, HAW Hamburg (DE)
L. Yngstrom, Univ. of Stockholm (SE)
M. Yung, Google (US)

ORGANIZING COMMITTEE CHAIRS
M. Theoharidou, AUEB (GR)
N. Kyrloglou, ACCI (GR)

PUBLICITY CHAIR
S. Foresti, Universita' degli Studi di Milano (IT)



This call for papers and additional information about the conference 
can be found at http://www.sec2012.org
For information regarding the conference you may contact: info@sec2012.org