Tag: school

Jun 11

CALL FOR PAPERS: 2012 International Conference on Management of e-Commerce and e-Government

CALL FOR PAPERS
2012 International Conference on Management of e-Commerce and e-Government
Beijing, P. R. China, October 20-21, 2012
http://www.icmecg2012.org/

2012 International Conference on Management of e-Commerce and e-Government (ICMeCG 2012) provides a high quality platform for researchers, practitioners, and policy makers from all over the world to present their research results and development activities in e-Commerce and e-Government.It aims to bring together academics and practitioners to explore new frontiers of these areas – with emphasis on cross-disciplinary research, innovative initiatives, solutions and approaches to making the Internet a productive and efficient alternative for the new e-Society.
We welcome paper submissions from different aspects of business and from different disciplines. Conference proceedings will be listed in the Index to EI (Engineering index).
Conference Topics:
There are eight major tracks in this conference. Topics listed below are suggested but not limited to.
-Theory and Developments of E-commerce
-Information Security and Risk Management
-Web 2.0 and Social Media
-M-Commerce and Ubiquitous Computing
-Enterprise Information Systems
-Knowledge Management and Business Intelligence
-e-Government and e-governance
-Operations and Services Management
Important Dates
Submission deadline: June 24, 2012
Acceptance announcement: July 15, 2012
Conference date: October 20-21, 2012
Paper submission
Please submit your papers to ICMeCG 2012 in
https://www.easychair.org/conferences/?conf=icmecg2012
Submitted manuscripts in English will be limited to 6 pages.
The manuscripts must be formatted using the Conference Proceedings template. Formatting instructions can be found on the conference website.
Contact Us at:
MS Zhou (Conference Coordinator)
Tel:86-10-6228-8896
E-mail: icmecg2012@gmail.com for authors outside China,
icmecg2012@126.com for authors in China
Address: School of Information, Central University of Finance
and Economics, 39 South College Road, Haidian District,Beijing, P.R.China 100081

Jun 05

International School on Foundations of Security Analysis and Design – FOSAD 2012

International School on Foundations of Security Analysis and Design – FOSAD 2012.

Jun 04

Seminar: Nikita Veshchikov “ECRYPT II Summer School on Tools (summary)” (Jun 5, 2012)

Jun 5, 2012 – 12.30 – Computer Department Seminar Room – NO Building, 8th floor (2NO8.08)

Speaker : Nikita Veshchikov (ULB)

Title : ECRYPT II Summer School on Tools (summary)

May 31

CFP: Social and Mobile Media for Governance « Digital Government & Society

The International Conference on e-Democracy and Open Government-Asia 2012 (CeDEM-Asia-2012) is a forum that aims to bring together academics, researchers, policy-makers, industry professionals, and civil society activists to discuss the role of social and mobile media in the future of governance in Asia and elsewhere. CeDEM-Asia-2012 will be held on November 14-15 in Singapore.

Call for Papers

New means of interacting with government and political institutions are causing significant shifts in political and social life. The emerging social and mobile media practices, including content generation, collaboration, and network organization, are changing our understanding of governance and politics. While the changes are already widely debated in mature, developed democracies, there is an even greater need to address them in the context of rapidly developing Asian societies. Following five successful conferences at the Danube University of Krems, CeDEM is looking to open a new forum in Asia for the exchange of ideas, networking, and collaboration on the topics of e-democracy and open government. This year, CeDEM is pleased to be working with the Asian Media Information and Communication Centre (AMIC) as its conference organizer and the Wee Kim Wee School of Communication and Information at Nanyang Technological University, Singapore as its main partner. CeDEM-Asia-2012 seeks to critically analyze present and future developments in field, with a special focus on the following themes:

  • Social media to engage citizens, smart & mobile democracy, sustainability of e-participation
  • Mobilization via social media, networks vs. traditional party-structure, online campaigning
  • Communication technologies and their use for governmental transformation
  • Open data initiatives, transparency, participation and collaboration in government
  • Cultures of governance, access and openness, crowdsourcing for government
  • Information provision, mobile devices, service delivery via new communication channels
  • Online communities, innovation, bottom-up vs. top-down
  • Network effects, power laws, long tail, social web

Conference Chairs

  • Nojin Kwak (University of Michigan, USA)
  • Peter Parycek (Danube University Krems, Austria)
  • Marko M. Skoric (Nanyang Technological University, Singapore)

Submission Guidelines

The submission portal will be open mid June 2012.

  • Research papers, case studies and policy papers should be 12 pages maximum and will be double-blind peer-reviewed.
  • Reflection papers should 6 pages maximum and will be selected by the chairs.
  • Workshop proposals should be no more than 2 pages and will be selected by the chairs.

Publications

The conference proceedings will be published (ISBN) and made available online under the Creative Commons License. A selection of best research papers and case studies of CeDEM-Asia-2012 will be published with the open access eJournal of eDemocracy and Open Government .

Important Dates

  • Submission deadline for full papers and workshop proposals: 15 July 2012
  • Notification of acceptance: 24 September 2012
  • Camera-ready paper submission: 15 October 2012
  • Conference dates & location: 14-15 November 2012, Singapore”

CFP: Social and Mobile Media for Governance « Digital Government & Society.

May 29

Summer School CryptoBG*2012 on Cryptography and Information Security

********************************************************************************
Announcement: Summer School CryptoBG*2012
on Cryptography and Information Security
28 July – 5 August 2012
in  “National Institute of Education”, Oriahovitza, Bulgaria

www.cryptobg.org
DEADLINE for registration: 30 June 2012

********************************************************************************

It is our pleasure to invite you to CryptoBG*2012. The participants will follow a series of lectures, tutorials and seminars given by international experts in theoretical and practical Cryptography and Information Security.

Preliminary list of Lecturers and Tutorials:

Prof. Mladen Dimitrov, Université de Lille, France : “Introduction to elliptic curves”

Prof. Krassimir Manev, Sofia University St Kliment Ohridski, Bulgaria : “Hardness of algorithmic tasks – a fundamental for cryptography”

Prof. Veselin Tzelkov, Personal Data Security Commission, Bulgaria : TBD

Dr. Nicolas Gama, Université de Versailles, France : “Introduction to lattice-based cryptography”

Dr. Valérie Gauthier, Université de Caen, France : “Introduction to code-based cryptography”

Dr. Dimitar Jetchev, EPFL, Switzerland : “Security and Cryptography in the Context of the Cloud – Practical and Theoretical Aspects”

Dr. Yacov Yacobi, Israel (ex Microsoft Research, USA) : TBD

Dr. George Sharkov, ESI Center Eastern Europe, Bulgaria : “From Cyber-Defense to resilient business”

Dr. Benjamin Smith, INRIA, Ecole Polychechnique, France : “Introduction to Elliptic Curve Cryptography”

Prof. Dimitar Birov, FMI – Sofia University, Bulgaria (School of Computer Science, CMU, USA) :  “Software Architecture-Based Security”

Robert Seacord, Secure Coding Lead, CERT/Carnegie Mellon University, USA  : TBD

Information and REGISTRATION can be found at: www.cryptobg.org

Looking forward to see you in Bulgaria,

Organizing Committee:

Prof. Minko Balkanski, IHE, France minko.balkanski@balkanski-foundation.org
Dr. George Sharkov, ESI CEE, Bulgaria gesha@esicenter.bg
Dr. Dimitar Jetchev, EPFL, Switzerland dimitar.jetchev@epfl.ch
Mariya Georgieva, University of Caen, France mariya.georgieva@unicaen.fr

May 14

International Symposium on Engineering Secure Software and Systems (ESSoS)

Call For Papers

International Symposium on Engineering Secure Software and Systems (ESSoS)

http://distrinet.cs.kuleuven.be/events/essos/2013/

February 27 – March 1, 2013, Paris, France

In cooperation with (pending): ACM SIGSAC and SIGSOFT and IEEE CS (TCSE).

CONTEXT AND MOTIVATION

Trustworthy, secure software is a core ingredient of the modern world. Hostile, networked environments, like the Internet, can allow vulnerabilities in software to be exploited from anywhere.  To address this, high-quality security
building blocks (e.g., cryptographic components) are necessary, but insufficient. Indeed, the construction of secure software is challenging because of the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies and the progress of attack vectors. Clearly, a strong need exists for engineering techniques that scale well and that demonstrably improve the software’s security properties.

GOAL AND SETUP

The goal of this symposium, which will be the fifth in the series, is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering. Being one of the few conference-level events dedicated to this topic, it explicitly aims to bridge the software engineering and security  engineering communities, and promote cross-fertilization. The symposium will feature two days of technical program, and is also open to proposals for both  tutorials and workshops. In addition to academic papers, the symposium  encourages submission of high-quality, informative experience papers about  successes and failures in security software engineering and the lessons learned. Furthermore, the symposium also accepts short idea papers that crisply describe  a promising direction, approach, or insight.

TOPICS

The Symposium seeks submissions on subjects related to its goals. This includes a diversity of topics including (but not limited to):

– scalable techniques for threat modeling and analysis of vulnerabilities
– specification and management of security requirements and policies
– security architecture and design for software and systems
– model checking for security
– specification formalisms for security artifacts
– verification techniques for security properties
– systematic support for security best practices
– security testing
– security assurance cases
– programming paradigms, models and DLS’s for security
– program rewriting techniques
– processes for the development of secure software and systems
– security-oriented software reconfiguration and evolution
– security measurement
– automated development
– trade-off between security and other non-functional requirements (in particular economic considerations)
– support for assurance, certification and accreditation
– empirical secure software engineering

SUBMISSION AND FORMAT

The proceedings of the symposium are published by Springer-Verlag (pending) in  the Lecture Notes in Computer Science Series (http://www.springer.com/lncs).

Submissions should follow the formatting instructions of Springer LNCS. Submitted papers must present original, non-published work of high quality.

For selected papers, there will be an invitation to submit extended versions to a special issue in the International Journal of Information Security.

Two types of papers will be accepted:

Full papers (max 14 pages without bibliography/appendices) – May describe original technical research with a solid foundation, such as formal analysis or experimental results, with acceptance determined mostly based on novelty and validation. Or, may describe case studies applying existing techniques or analysis methods in industrial settings, with acceptance determined mostly by the general applicability of techniques and the completeness of the technical presentation details.

Idea papers (max 8 pages with bibliography) – May crisply describe a novel idea that is both feasible and interesting, where the idea may range from a variant of an existing technique all the way to a vision for the future of security technology. Idea papers allow authors to introduce ideas to the field and get feedback, while allowing for later publication of complete, fully-developed results.

 

Submissions will be judged primarily on novelty, excitement, and exposition, but feasibility is required, and acceptance will be unlikely without some basic, principled validation (e.g., extrapolation from limited experiments or simple formal analysis). In the proceedings, idea papers will clearly identified by means of the “Idea” tag in the title.

Proposals for both tutorials and workshops are welcome. Further guidelines will appear on the website of the symposium.

IMPORTANT DATES

Paper submission:             September 30, 2012
Author notification:           November 22, 2012
Camera-ready:                  December 13, 2012

PROGRAM COMMITTEE

PC Co-Chairs

Jan Jürjens, TU Dortmund and Fraunhofer ISST
Ben Livshits, Microsoft Research

PC
Davide Balzarotti, EURECOM, France
Ruth Breu, University of Innsbruck, Austria
Cristian Cadar, Imperial College, UK
Julian Dolby, IBM Research, US
Matt Fredrikson, University of Wisconsin, US
Dieter Gollmann, TU Hamburg-Harburg, Germany
Maritta Heisel, U. Duisburg Essen, Germany
Peter Herrmann, NTNU, Trondheim, Norway
Thorsten Holz, U. Ruhr Bochum, Germany
Sergio Maffeis, Imperial College, UK
Heiko Mantel, TU Darmstadt, Germany
Anders Møller, Aarhus University, Denmark
Haris Mouratidis, University of East London, UK
Zachary Peterson, Naval Postgraduate School, US
Frank Piessens, KU Leuven, Belgium
Erik Poll, RU Nijmegen, NL
Alexander Pretschner, TU Munich, Germany
Wolfgang Reif, University of Augsburg, Germany
Jianying Zhou, Institute for Infocomm Research, Singapore
Mohammad Zulkernine, Queens University, Canada

Mar 05

CFP 9th International Conference on Security and Cryptography (SECRYPT 2012)

CALL FOR PAPERS

************************************************************************
9th International Conference on Security and Cryptography (SECRYPT 2012)
Rome, Italy, July 24-27, 2012
http://secrypt.icete.org
************************************************************************

SECRYPT is an annual international conference covering research in
information and communication security.  The 9th International
Conference on Security and Cryptography (SECRYPT 2012) will be held in
Rome, Italy.  The conference seeks submissions from academia,
industry, and government presenting novel research on all theoretical
and practical aspects of data protection, privacy, security, and
cryptography.  Papers describing the application of security
technology, the implementation of systems, and lessons learned are
also encouraged.  The conference topics include, but are not limited
to:

– Access Control
– Applied Cryptography
– Authentication
– Biometrics Security and Privacy
– Critical Infrastructure Protection
– Data Integrity
– Data Protection
– Database Security and Privacy
– Digital Forensics
– Digital Rights Management
– Ethical and Legal Implications of Security and Privacy
– Formal Methods for Security
– Human Factors and Human Behaviour Recognition Techniques
– Identification, Authentication and Non-repudiation
– Identity Management
– Information Hiding
– Information Systems Auditing
– Insider Threats and Countermeasures
– Intellectual Property Protection
– Intrusion Detection & Prevention
– Management of Computing Security
– Network Security
– Organizational Security Policies
– Peer-to-Peer Security
– Personal Data Protection for Information Systems
– Privacy
– Privacy Enhancing Technologies
– Reliability and Dependability
– Risk Assessment
– Secure Cloud Computing
– Secure Software Development Methodologies
– Security Protocols
– Security and Privacy in Mobile Systems
– Security and Privacy in Complex Systems
– Security and Privacy in IT Outsourcing
– Security and Privacy in Location-based Services
– Security and Privacy in Pervasive/Ubiquitous Computing
– Security and Privacy in Social Networks
– Security and Privacy in Web Services
– Security and Privacy Policies
– Security Area Control
– Security Deployment
– Security Engineering
– Security for Grid Computing
– Security in Distributed Systems
– Security Information Systems Architecture and Design and Security
Patterns
– Security Management
– Security Metrics and Measurement
– Security Requirements (Threats, Vulnerabilities, Risk, Formal
Methods, etc.)
– Security Verification and Validation
– Sensor and Mobile Ad Hoc Network Security
– Service and Systems Design and QoS Network Security
– Software Security
– Trust Management and Reputation Systems
– Ubiquitous Computing Security
– Wireless Network Security (WiFi, WiMAX, WiMedia and others)

PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings.  All submissions should be appropriately
anonymized (i.e., papers should not contain author names or
affiliations, or obvious citations). Submissions are to be made to the
submission web site at http://www.insticc.org/Primoris.

Two categories of papers can be submitted:

– Full Paper: A full paper presents a work where the research is
completed or almost finished.  Authors of regular submitted papers
will indicate at the time of submission whether they would like
their paper to also be considered for publication as a position
paper.
– Position Paper: A position paper presents results that are
preliminary or that simply require few pages to describe. A position
paper may be a short report and discussion of ideas, facts,
situations, methods, procedures, or results of scientific research
(bibliographic, experimental, theoretical, or other) focused on one
of the conference topics. The acceptance of a position paper is
restricted to the categories of “short paper” or “poster”.

Submitted papers must be formatted according to the SECRYPT format
(with the exception that authors should be blinded in the submission),
which is described at http://secrypt.icete.org/paper_formats.asp.
Submission page limit is 10 pages for full paper and 6 pages for position papers.
Accepted papers will be subject to the limit of: 10 pages (for full papers), 6
pages (for short papers), and 4 pages (for posters).  Submitted papers
will be subject to a double-blind review process.  All submissions
should be anonymized. All accepted papers/posters will be published in
the conference proceedings.  A short list of presented papers will be
selected so that revised and extended versions of these papers will be
published by Springer-Verlag in a CCIS Series book.  Authors of
accepted papers/posters must guarantee that their papers/posters will be
presented at the conference.

IMPORTANT DATES
Full Paper submission: March 19, 2012
Authors Notification (full papers): May 4, 2012
Final Full Paper Submission and Registration: May 14, 2012

CONFERENCE CHAIR
Mohammad S. Obaidat, Monmouth University, U.S.A.

PROGRAM CHAIR
Pierangela Samarati, Universita’ degli Studi di Milano, Italy

PROGRAM CO-CHAIRS
Wenjing Lou, Virginia Polytechnic Institute and State University, United States
Jianying Zhou, Institute For Infocomm Research, Singapore

PROGRAM COMMITTEE
Claudio Ardagna, Universita` degli Studi di Milano, Italy
Ken Barker, University of Calgary, Canada
Carlo Blundo, Università di Salerno,, Italy
David Chadwick, University of Kent ,United Kingdom
Aldar Chan, Institute for Infocomm Researc,h Singapore
Ee-chien Chang, National University of Singapore Singapore
Yingying Chen, Stevens Institute of Technology,, United States
Cheng-Kang Chu, Institute for Infocomm Research, Singapore
Marco Cova, University of Birmingham,, United Kingdom
Jorge Cuellar, Siemens AG,, Germany
Frédéric Cuppens, Ecole Nationale de Télécommunications de Bretagne,, France
Reza Curtmola,  New Jersey Institute of Tech,, United States
Ricardo Dahab, University of Campinas (UNICAMP) ,, Brazil
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Roberto Di Pietro, Universita’ di Roma Tre,, Italy
Tassos Dimitriou, Athens Information Technology,, Greece
Josep Domingo-ferrer, Rovira I Virgili University of Tarragona, Spain
Eduardo B. Fernandez, Florida Atlantic University, United States
Eduardo Fernández-medina, University of Castilla-La Mancha, Spain
Alberto Ferrante, University of Lugano, Switzerland
Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain
Simone Fischer-Hübner, Karlstad University, Sweden
Sara Foresti, Universita’ degli Studi di Milano, Italy
Keith Frikken, Miami University of Ohio, United States
Steven Furnell, University of Plymouth, United Kingdom
Mark Gondree, Naval Postgraduate School, United States
Dimitris Gritzalis, AUEB, Greece
Yong Guan, Iowa State University, United States
Xinyi Huang, Fujian Normal University, China
Michael Huth, Imperial College London, United Kingdom
Cynthia Irvine, Naval Postgraduate School, United States
Sokratis Katsikas, University of Piraeus, Greece
Stefan Katzenbeisser, Technische Universität Darmstadt, Germany
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan
Costas Lambrinoudakis, University of Piraeus, Greece
Bo Lang Beijing, University of Aeronautics and Astronautics, China
Loukas Lazos,  University of Arizona, United States
Adam J. Lee,  University of Pittsburgh, United States
Patrick Lee,  Chinese University of Hong Kong Hong Kong
Albert Levi, Sabanci University, Turkey
Jiguo Li, Hohai University, China
Ming Li, Utah State University, United States
Giovanni Livraga, Universita degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Emil Lupu, Imperial College, United Kingdom
Luigi Mancini, University of Rome La Sapienza, Italy
Olivier Markowitch, Université Libre de Bruxelles, Belgium
Vashek Matyas, Masaryk University Czech Republic
Carlos Maziero, UTFPR – Federal University of Technology – Paraná state, Brazil
Chris Mitchell, Royal Holloway, University of London, United Kingdom
Atsuko Miyaji, Japan Advaned Institute of Science and Technology, Japan
Marco Casassa-Mont, Hewlett-Packard Laboratories, United Kingdom
David Naccache, Ecole Normale Superieure, France
Guevara Noubir,  Northeastern University, United States
Eiji Okamoto, University of Tsukuba, Japan
Rolf Oppliger, eSECURITY Technologies, Switzerland
Stefano Paraboschi, University of Bergamo, Italy
Gerardo Pelosi, Politecnico di Milano, Italy
Günther Pernul, University of Regensburg, Germany
Raphael C.-w. Phan, Loughborough University, United Kingdom
Radha Poovendran,  University of Washington, United States
Joachim Posegga, Institute of IT Security and Security Law, Germany
Kui Ren, Illinois Institute of Technology, United States
Jian Ren, Michigan State University, United States
Sushmita Ruj, University of Ottawa Canada
Gokay Saldamli Bogazici, University MIS department, Turkey
Martin Schläffer, Graz University of Technology, Austria
Miguel Soriano, UPC, Spain
Cosimo Stallo, University of Rome Tor Vergata, Italy
Neeraj Suri, Technische Universität Darmstadt, Germany
Willy Susilo, University of Wollongong, Australia
Chiu Tan, Temple University, United States
Juan Tapiador, Universidad Carlos III de Madrid, Spain
Wen-guey Tzeng, National Chiao Tung University, Taiwan
Guilin Wang, University of Wollongong, Australia
Xinyuan (Frank) Wang, George Mason University , United States
Haining  Wang, The College of William and Mary, United States
Lingyu Wang, Concordia University Canada
Osman Yagan, Carnegie Mellon University, United States
Danfeng Yao, Virginia Tech, United States
Alec Yasinsac, University of South Alabama, United States
Shucheng Yu, University of Arkansas at Little Rock, United States
Wensheng Zhang, Iowa State University, United States
Futai Zhang, Nanjing Normal University, China
Wen Tao Zhu, Graduate University of Chinese Academy of Sciences, China

This call for papers and additional information about the conference
can be found at http://secrypt.icete.org/

For any questions, please contact the program chairs:
secrypt2012@unimi.it

———————————————–

SECRYPT 2012 is part of the International Joint Conference on e-Business and
Telecommunications (ICETE 2012) that has 5 more conferences with very strong synergies between them, namely:

– DCNET: Int’l Conference on Data Communication Networking (http://www.dcnet.icete.org)
– ICE-B: Int’l Conference on e-Business (http://www.ice-b.icete.org)
– OPTICS: Int’l Conference on Optical Communication Systems (http://www.optics.icete.org)
– SIGMAP: Int’l Conference on Signal Processing and Multimedia Applications (http://www.sigmap.icete.org)
– WINSYS: Int’l Conference on Wireless Information Networks and Systems (http://www.winsys.icete.org)

The conference program features a number of Keynote Lectures to be delivered by
distinguished world-class researchers, namely:
– Venu Govindaraju, University at Buffalo, United States
– Sushil Jajodia, George Mason University Fairfax, United States
– Andreas Holzinger, Medical University Graz, Austria
– Geoffrey Charles Fox, Indiana University, United States
http://www.icete.org/KeynoteSpeakers.aspx

Feb 01

9th International Conference on Security and Cryptography (SECRYPT 2012)

CALL FOR PAPERS

************************************************************************
9th International Conference on Security and Cryptography (SECRYPT 2012)
Rome, Italy, July 24-27, 2012
http://secrypt.icete.org
************************************************************************

SECRYPT is an annual international conference covering research in
information and communication security.  The 9th International
Conference on Security and Cryptography (SECRYPT 2012) will be held in
Rome, Italy.  The conference seeks submissions from academia,
industry, and government presenting novel research on all theoretical
and practical aspects of data protection, privacy, security, and
cryptography.  Papers describing the application of security
technology, the implementation of systems, and lessons learned are
also encouraged.  The conference topics include, but are not limited
to:

– Access Control
– Applied Cryptography
– Authentication
– Biometrics Security and Privacy
– Critical Infrastructure Protection
– Data Integrity
– Data Protection
– Database Security and Privacy
– Digital Forensics
– Digital Rights Management
– Ethical and Legal Implications of Security and Privacy
– Formal Methods for Security
– Human Factors and Human Behaviour Recognition Techniques
– Identification, Authentication and Non-repudiation
– Identity Management
– Information Hiding
– Information Systems Auditing
– Insider Threats and Countermeasures
– Intellectual Property Protection
– Intrusion Detection & Prevention
– Management of Computing Security
– Network Security
– Organizational Security Policies
– Peer-to-Peer Security
– Personal Data Protection for Information Systems
– Privacy
– Privacy Enhancing Technologies
– Reliability and Dependability
– Risk Assessment
– Secure Cloud Computing
– Secure Software Development Methodologies
– Security Protocols
– Security and Privacy in Mobile Systems
– Security and Privacy in Complex Systems
– Security and Privacy in IT Outsourcing
– Security and Privacy in Location-based Services
– Security and Privacy in Pervasive/Ubiquitous Computing
– Security and Privacy in Social Networks
– Security and Privacy in Web Services
– Security and Privacy Policies
– Security Area Control
– Security Deployment
– Security Engineering
– Security for Grid Computing
– Security in Distributed Systems
– Security Information Systems Architecture and Design and Security
 Patterns
– Security Management
– Security Metrics and Measurement
– Security Requirements (Threats, Vulnerabilities, Risk, Formal
 Methods, etc.)
– Security Verification and Validation
– Sensor and Mobile Ad Hoc Network Security
– Service and Systems Design and QoS Network Security
– Software Security
– Trust Management and Reputation Systems
– Ubiquitous Computing Security
– Wireless Network Security (WiFi, WiMAX, WiMedia and others) 

PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings.  All submissions should be appropriately
anonymized (i.e., papers should not contain author names or
affiliations, or obvious citations). Submissions are to be made to the
submission web site at http://www.insticc.org/Primoris.

Two categories of papers can be submitted: 

– Full Paper: A full paper presents a work where the research is
 completed or almost finished.  Authors of regular submitted papers
 will indicate at the time of submission whether they would like
 their paper to also be considered for publication as a position
 paper.
– Position Paper: A position paper presents results that are
 preliminary or that simply require few pages to describe. A position
 paper may be a short report and discussion of ideas, facts,
 situations, methods, procedures, or results of scientific research
 (bibliographic, experimental, theoretical, or other) focused on one
 of the conference topics. The acceptance of a position paper is
 restricted to the categories of "short paper" or "poster".

Submitted papers must be formatted according to the SECRYPT format
(with the exception that authors should be blinded in the submission), 
which is described at http://secrypt.icete.org/paper_formats.asp.  
Submission page limit is 10 pages for full paper and 6 pages for position papers. 
Accepted papers will be subject to the limit of: 10 pages (for full papers), 6
pages (for short papers), and 4 pages (for posters).  Submitted papers
will be subject to a double-blind review process.  All submissions
should be anonymized. All accepted papers/posters will be published in
the conference proceedings.  A short list of presented papers will be
selected so that revised and extended versions of these papers will be
published by Springer-Verlag in a CCIS Series book.  Authors of
accepted papers/posters must guarantee that their papers/posters will be
presented at the conference.


IMPORTANT DATES
Full Paper submission: March 5, 2012
Authors Notification (full papers): May 4, 2012 
Final Full Paper Submission and Registration: May 14, 2012

CONFERENCE CHAIR
Mohammad S. Obaidat, Monmouth University, U.S.A.

PROGRAM CHAIR
Pierangela Samarati, Universita' degli Studi di Milano, Italy 

PROGRAM CO-CHAIRS
Wenjing Lou, Virginia Polytechnic Institute and State University, United States
Jianying Zhou, Institute For Infocomm Research, Singapore


PROGRAM COMMITTEE
Claudio Ardagna, Universita` degli Studi di Milano, Italy
Ken Barker, University of Calgary, Canada
Carlo Blundo, Università di Salerno,, Italy
David Chadwick, University of Kent ,United Kingdom
Aldar Chan, Institute for Infocomm Researc,h Singapore
Ee-chien Chang, National University of Singapore Singapore
Yingying Chen, Stevens Institute of Technology,, United States
Cheng-Kang Chu, Institute for Infocomm Research, Singapore
Marco Cova, University of Birmingham,, United Kingdom
Jorge Cuellar, Siemens AG,, Germany
Frédéric Cuppens, Ecole Nationale de Télécommunications de Bretagne,, France
Reza Curtmola,  New Jersey Institute of Tech,, United States
Ricardo Dahab, University of Campinas (UNICAMP) ,, Brazil
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Roberto Di Pietro, Universita' di Roma Tre,, Italy
Tassos Dimitriou, Athens Information Technology,, Greece
Josep Domingo-ferrer, Rovira I Virgili University of Tarragona, Spain
Eduardo B. Fernandez, Florida Atlantic University, United States
Eduardo Fernández-medina, University of Castilla-La Mancha, Spain
Alberto Ferrante, University of Lugano, Switzerland
Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain
Simone Fischer-Hübner, Karlstad University, Sweden
Sara Foresti, Universita' degli Studi di Milano, Italy
Keith Frikken, Miami University of Ohio, United States
Steven Furnell, University of Plymouth, United Kingdom
Mark Gondree, Naval Postgraduate School, United States
Dimitris Gritzalis, AUEB, Greece
Yong Guan, Iowa State University, United States
Xinyi Huang, Fujian Normal University, China
Michael Huth, Imperial College London, United Kingdom
Cynthia Irvine, Naval Postgraduate School, United States
Sokratis Katsikas, University of Piraeus, Greece
Stefan Katzenbeisser, Technische Universität Darmstadt, Germany
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan
Costas Lambrinoudakis, University of Piraeus, Greece
Bo Lang Beijing, University of Aeronautics and Astronautics, China
Loukas Lazos,  University of Arizona, United States
Adam J. Lee,  University of Pittsburgh, United States
Patrick Lee,  Chinese University of Hong Kong Hong Kong
Albert Levi, Sabanci University, Turkey
Jiguo Li, Hohai University, China
Ming Li, Utah State University, United States
Giovanni Livraga, Universita degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Emil Lupu, Imperial College, United Kingdom
Luigi Mancini, University of Rome La Sapienza, Italy
Olivier Markowitch, Université Libre de Bruxelles, Belgium
Vashek Matyas, Masaryk University Czech Republic
Carlos Maziero, UTFPR – Federal University of Technology – Paraná state, Brazil
Chris Mitchell, Royal Holloway, University of London, United Kingdom
Atsuko Miyaji, Japan Advaned Institute of Science and Technology, Japan
Marco Casassa-Mont, Hewlett-Packard Laboratories, United Kingdom
David Naccache, Ecole Normale Superieure, France
Guevara Noubir,  Northeastern University, United States
Eiji Okamoto, University of Tsukuba, Japan
Rolf Oppliger, eSECURITY Technologies, Switzerland
Stefano Paraboschi, University of Bergamo, Italy
Gerardo Pelosi, Politecnico di Milano, Italy
Günther Pernul, University of Regensburg, Germany
Raphael C.-w. Phan, Loughborough University, United Kingdom
Radha Poovendran,  University of Washington, United States
Joachim Posegga, Institute of IT Security and Security Law, Germany
Kui Ren, Illinois Institute of Technology, United States
Jian Ren, Michigan State University, United States
Sushmita Ruj, University of Ottawa Canada
Gokay Saldamli Bogazici, University MIS department, Turkey
Martin Schläffer, Graz University of Technology, Austria
Miguel Soriano, UPC, Spain
Cosimo Stallo, University of Rome Tor Vergata, Italy
Neeraj Suri, Technische Universität Darmstadt, Germany
Willy Susilo, University of Wollongong, Australia
Chiu Tan, Temple University, United States
Juan Tapiador, Universidad Carlos III de Madrid, Spain
Wen-guey Tzeng, National Chiao Tung University, Taiwan
Guilin Wang, University of Wollongong, Australia
Xinyuan (Frank) Wang, George Mason University , United States
Haining  Wang, The College of William and Mary, United States
Lingyu Wang, Concordia University Canada
Osman Yagan, Carnegie Mellon University, United States
Danfeng Yao, Virginia Tech, United States
Alec Yasinsac, University of South Alabama, United States
Shucheng Yu, University of Arkansas at Little Rock, United States
Wensheng Zhang, Iowa State University, United States
Futai Zhang, Nanjing Normal University, China
Wen Tao Zhu, Graduate University of Chinese Academy of Sciences, China

This call for papers and additional information about the conference
can be found at http://secrypt.icete.org/

For any questions, please contact the program chairs:
secrypt2012@unimi.it

———————————————–

SECRYPT 2012 is part of the International Joint Conference on e-Business and 
Telecommunications (ICETE 2012) that has 5 more conferences with very strong synergies between them, namely:

– DCNET: Int'l Conference on Data Communication Networking (http://www.dcnet.icete.org)
– ICE-B: Int'l Conference on e-Business (http://www.ice-b.icete.org)
– OPTICS: Int'l Conference on Optical Communication Systems (http://www.optics.icete.org)
– SIGMAP: Int'l Conference on Signal Processing and Multimedia Applications (http://www.sigmap.icete.org)
– WINSYS: Int'l Conference on Wireless Information Networks and Systems (http://www.winsys.icete.org)

The conference program features a number of Keynote Lectures to be delivered by 
distinguished world-class researchers, namely:
– Venu Govindaraju, University at Buffalo, United States
– Sushil Jajodia, George Mason University Fairfax, United States
– Andreas Holzinger, Medical University Graz, Austria
(list not yet complete)
http://www.icete.org/KeynoteSpeakers.aspx

Jan 07

IEEE International Symposium on HARDWARE-ORIENTED SECURITY and TRUST

HOST-2012 IEEE International Symposium on HARDWARE-ORIENTED SECURITY and TRUST

June 3-4, Moscone Center, San Francisco, CA
Held in conjunction with DAC-2012 (http://www.hostsymposium.org)


                              Call for Papers


A wide range of applications, from secure RFID tagging to high-end trusted computing,
relies on dedicated and trusted hardware platforms. The security and trustworthiness of
such hardware designs are critical to their successful deployment and operation. Recent
advances in tampering and reverse engineering show that important challenges lie
ahead. For example, secure electronic designs may be affected by malicious circuits,
Trojans that alter system operation. Furthermore, dedicated secure hardware
implementations are susceptible to novel forms of attack that exploit side-channel
leakage and faults. Third, the globalized, horizontal semiconductor business model
raises concerns of trust and intellectual-property protection. HOST 2012 is a forum for
novel solutions to address these challenges. Innovative test mechanisms may reveal
Trojans in a design before they are able to do harm. Implementation attacks may be
thwarted using side-channel resistant design or fault-tolerant designs. New securityaware
design tools can assist a designer in implementing critical and trusted
functionality, quickly and efficiently.
The IEEE International Symposium on Hardware Oriented Security and Trust seeks
original contributions in the area of hardware-oriented security. This includes tools,
design methods, architectures, and circuits. In addition, novel applications of secure
hardware are especially welcome. HOST 2012 seeks contributions based on, but not
limited to, the following topics.
• Trojan detection and isolation
• Implementation attacks and countermeasures
• Side channel analysis and fault analysis
• Intellectual property protection and metering
• Tools and methodologies for secure hardware design
• Hardware architectures for cryptography
• Hardware security primitives: PUFs and TRNGs
• Applications of secure hardware
• Interaction of secure hardware and software
To present at the symposium, submit an Acrobat (PDF) version of your paper on the
symposium submission website. The page limit is 6 pages, double column, IEEE
format, with a minimum font size of 10 points. Submissions must be anonymous and
must not identify the submitting authors, directly or indirectly, anywhere in the
manuscript.


SCHEDULE:

Submission of Paper:         January 20, 2012
Notification of Acceptance:  March 23, 2012
Camera Ready Paper:          April 13, 2012



General Chair
K. Mai, CMU


Program Chair
R. Karri, Polytechnic Inst of New York U.


Vice-program Chair
F. Koushanfar, Rice University


Panel Chair
Y. Makris, UT Dallas


Publicity Chair
G. Qu, U. Maryland


Registration Chair
J. Plusquellic, U. of New Mexico


Publication Chair
T. Huffmire, Naval Postgraduate School


Finance Chair
W. Robinson, Vanderbilt


Industry Liaison

M. Hsiao, Virginia Tech


Steering Committee

M. Tehranipoor (chair), U. Connecticut
J. Plusquellic, U. of New Mexico
F. Koushanfar, Rice University
M. Potkonjak, UC Los Angeles


Program Committee

D. Acharyya, Verigy
D. Arora, Intel
S. Bhunia, Case Western Reserve U.
S. Devadas, MIT
J. Dworak, Southern Methodist U.
S. Fazzari, Booz Allen Hamilton
Y. Fei, Northeastern U.
J. Guajardo, Bosch
S. Guilley, ENST Paris
I. Harris, UC Irvine
T. Huffmire, Naval Postgraduate School
R. Kastner, UC San Diego
Y. Makris, UT Dallas
D. Naccache, ECNS Paris
L. Nazandhali, Virginia Tech
C. Paar, Ruhr U.
Y. Pino, Air Force Research Labs
N. Potlapally, Intel
G. Qu, U. of Maryland
F. Regazzoni, U. Catholique de Louvain
P. Rohatgi, CRI
M. Rivain, Crypto Experts
U. Ruhrmair, TU Munchen
A. Sadeghi, TU Darmstadt
K. Sakiyama, U. of ElectroCommunications
P. Schaumont, Virginia Tech
S. Skorobogatov, U. of Cambridge
M. Soma, U. of Washington
F. Standaert, U. Catholique de Louvain
J. Zambreno, Iowa State U.

Nov 20

2nd Bar-Ilan University Winter School on Cryptography

We would like to inform you about the 2nd Bar-Ilan University Winter
School on Cryptography. The school will be held on 19-22 February
2012, at Bar-Ilan University (Tel Aviv area, Israel). The theme of
this is year will be "Lattice Based Cryptography and Applications".

The winter school will provide an in depth coverage of lattices and
their role in cryptographic constructions. Among other things, we will
study the basics of lattices, hard problems on lattices and advanced
reductions between problems. In addition, we will study cryptographic
constructions based on lattices. These will include encryption,
interactive protocols, advanced encryption (identity based and
others), and finally recent advances in fully homomorphic encryption.
The school program includes approximately 20 hours of lectures, a
social dinner and an excursion.

The speakers at the school are leading researchers in lattice-based
cryptography: Craig Gentry, Vadim Lyubashevsky, Chris Peikert and Oded
Regev.

Participation is free of charge but we kindly ask you to register by
sending an email towinterschool.biu@gmail.com  as soon as possible,
and not later than 31/12/2011. Registration after this date may be
possible only upon availability.

More details, including accommodation, stipends and more, are available at

http://crypto.biu.ac.il/winterschool2012/

A full program will be available soon.

We would gladly appreciate if you could help us advertising this event
by forwarding this email to your colleagues.

Best Regards,
Yehuda Lindell and Claudio Orlandi