posted by user: tell || 12769 views || tracked by 11 users: [display]

FC 2013 : Financial Cryptography and Data Security

FacebookTwitterLinkedInGoogle


Conference Series : Financial Cryptography
 
Link: http://fc13.ifca.ai/
 
When Apr 1, 2013 - Apr 5, 2013
Where Okinawa, Japan
Submission Deadline Oct 13, 2012
Notification Due Dec 17, 2012
Final Version Due Jan 12, 2013
Categories    privacy   security   authentication   cryptography
 

Call For Papers

Call for Papers

Financial Cryptography and Data Security 2013

International Financial Cryptography Association logo
Seventeenth International Conference
April 1–5, 2013
Bankoku Shinryokan
Busena Terrace Beach Resort
Okinawa, Japan

(PDF version available here)

Financial Cryptography and Data Security is a major international forum for research, advanced development, education, exploration, and debate regarding information assurance, with a specific focus on commercial contexts. The conference covers all aspects of securing transactions and systems. Original works focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security are solicited. Submissions need not be exclusively concerned with cryptography. Systems security and inter-disciplinary efforts are particularly encouraged.

Topics include:

Anonymity and Privacy
Auctions and Audits
Authentication and Identification
Biometrics
Certification and Authorization
Cloud Computing Security
Commercial Cryptographic Applications
Data Outsourcing Security
Information Security
Game Theoretic Security
Securing Emerging Computational Paradigms
Identity Theft
Fraud Detection
Phishing and Social Engineering
Digital Rights Management
Digital Cash and Payment Systems
Digital Incentive and Loyalty Systems
Microfinance and Micropayments Contactless Payment and Ticketing Systems
Secure Banking and Financial Web Services
Security and Privacy in Mobile Devices and Applications
Security and Privacy in Automotive and Transport Systems and Applications
Smartcards, Secure Tokens and Secure Hardware
Privacy-enhancing Systems
Reputation Systems
Security and Privacy in Social Networks
Security and Privacy in Sound and Secure Financial Systems Based on Social Networks
Smart Meters Security and Privacy
Risk Assessment and Management
Risk Perceptions and Judgments
Legal and Regulatory Issues
Security Economics
Spam
Transactions and Contracts
Trust Management
Underground-Market Economics
Usable Security
Virtual Economies
Voting Systems

Important Dates

Workshop Proposal Submission July 23, 2012 August 15, 2012 (extended)
Workshop Proposal Notification August 20, 2012 August 31, 2012 (extended)
Paper Submission October 13, 2012
Paper Notification December 17, 2012
Final Papers January 12, 2013
Poster and Panel Submission December 22, 2012
Poster and Panel Notification January 14, 2013

Submission

Submissions are sought in the following categories:

(i) regular papers (15 pg LNCS format including references and maximum of 18 pg, i.e., 3 pg appendices),
(ii) short papers (8 pg LNCS format in total),
(iii) panels and workshops (2pg), and
(iv) posters (1 pg).

Committee members are not required to read the appendices, so the full papers should be intelligible without them. The regular and short paper submissions must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. In contrast, panel, workshop, and poster submissions must include author names and affiliations.

Papers must be formatted in standard LNCS format and submitted as PDF files. Submissions in other formats will be rejected. All papers must be submitted electronically according to the instructions and forms found on this web site and at the submission site.

Authors may only submit work that does not substantially overlap with work that is currently submitted or has been accepted for publication to a conference/workshop with proceedings or a journal. We consider double submission serious research fraud and will treat it as such. In case of doubt contact the program chair for any clarifications at fc13chair@ifca.ai.

Regular Research Papers

Research papers should describe novel, previously unpublished scientific contributions to the field, and they will be subject to rigorous peer review. Accepted submissions will be included in the conference proceedings to be published in the Springer-Verlag Lecture Notes in Computer Science (LNCS) series. Submissions are limited to 15 pages including references and maximum of 18 pages (i.e., 3 pages of appendices). Committee members are not required to read the appendices, so the full papers should be intelligible without them. Regular papers must be anonymous with no author names, affiliations, acknowledgements, or obvious references.

Short Papers

Short papers are also subject to peer review, however, the intention is to encourage authors to introduce work in progress, novel applications and corporate/industrial experiences. Short papers will be evaluated with a focus on novelty and potential for sparking participants' interest and future research avenues. Short paper submissions are limited to 8 pages in standard LNCS format in total. The paper title for short papers should necessarily include the text “Short Paper”. Short papers must be anonymous with no author names, affiliations, acknowledgements, or obvious references.

Panel Proposals

We especially would like to encourage submissions of panel proposals. These should include a very brief description of the panel topics, as well as of the prospective panelists. Accepted panel sessions will be presented at the conference. Moreover, each participant will contribute a one-page abstract to be published in the conference proceedings. Please feel free to contact us directly if you would like to further discuss the suitability of a certain topic. Panel submissions must not be anonymous and should be up to 2 pages, sent to fc13chair@ifca.ai.

Posters

The poster session is the perfect venue to share a provocative opinion, interesting established or preliminary work, or a cool idea that will spark discussion. Poster presenters will benefit from a multi-hour session to discuss their work, get exposure, and receive feedback from attendees. Poster submissions should be 1 page (in the same LNCS format). Please keep in mind that the poster deadline is later than the main paper submission deadline. The posters will be published in the proceedings. Poster proposals must not be anonymous and should be sent to the posters chair at fc13chair@ifca.ai.

Workshop Proposals

Proposals for workshops to be held at FC 2013 are also solicited. A workshop can be full day or half day in length. Workshop proposals should include: (i) a title, (ii) a call for papers, (iii) a brief summary and justification – including how it would fit into the greater FC scope, (iv) a (tentative) Program Committee and its Chair, (v) one-paragraph biographies for key organizers, and (vi) the expected (or previous – if workshop has been held in previous years) number of submissions, participants and acceptance rates. Workshop proposals must not be anonymous and should be sent to fc13workshops@ifca.ai.

The Rump Session

FC 2013 will also include the popular "rump session" held on one of the evenings in an informal, social atmosphere. The rump session is a program of short (5–7 minute), informal presentations on works in progress, off-the-cuff ideas, and any other matters pertinent to the conference. Any conference attendee is welcome to submit a presentation to the Rump Session Chair (to be announced at the conference). This submission should consist of a talk title, the name of the presenter, and, if desired, a very brief abstract. Submissions may be sent via e-mail, or submitted in person in the morning on the day of the session.

Organizers

General Chair Kazue Sako, NEC, Japan

Program Committee

Program Chair Ahmad-Reza Sadeghi, Technische Universität Darmstadt and Fraunhofer SIT Darmstadt, Germany

Alessandro Acquisti, Carnegie Mellon University, USA
Ross Anderson, Cambridge University, UK
Feng Bao, Institute for Infocomm Research, Singapore
Rainer Boehme, University of Münster, Germany
Jens Bohli, NEC Laboritories Europe, Germany
Colin Boyd, Queensland University of Technology, Australia
Liqun Chen, Hewlett-Packard Laboratories, UK
Sherman S.M. Chow, University of Waterloo, Canada / Chinese University of Hong Kong, China
Nicolas Christin, Carnegie Mellon University, USA
Reza Curtmola, New Jersey Institute of Technology, USA
George Danezis, Microsoft Research Cambridge, UK
Emiliano De Cristofaro, PARC, USA
Mina Deng, Philips Research, The Netherlands
Loic Duflot, ANSSI - French Network and Information Security Agency, France
William Enck, North Carolina State University, USA
Jens Grossklags, Penn State University, USA
Xuxian Jiang, North Carolina State University, USA
Ari Juels, RSA Laboratories, USA
Stefan Katzenbeisser, TU Darmstadt, Germany
Angelos Keromytis, Columbia University, USA
Florian Kerschbaum, SAP Research, Germany
Aggelos Kiayias, University of Connecticut, USA
Yuichi Komano, Toshiba Corporation, Japan
Kari Kostiainen, Nokia Research Center, Finland
Farinaz Koushanfar, Rice University, USA
Xuejia Lai, Shanghai Jiaotong University,
China Jiangtao Li, Intel Corporation, USA
Benoit Libert, Universite Catholique de Louvain, Belgium
Di Ma, University of Michigan-Dearborn, USA
Mark Manulis, University of Surrey, UK
Kanta Matsuura, University of Tokyo, Japan
Atsuko Miyaji, Japan Advanced Institute of Science and Technology, Japan
Refik Molva, EURECOM, France
Toru Nakanishi, Okayama University, Japan
Satoshi Obana, Hosei University, Japan
Eiji Okamoto, University of Tsukuba, Japan
Claudio Orlandi, Bar-Ilan University, Israel
Josef Pieprzyk, Macquarie University, Australia
Benny Pinkas, Bar Ilan University, Israel
Bart Preneel, Katholieke Universiteit Leuven (COSIC), Belgium
Thomas Schneider, TU Darmstadt, Germany
Jamshid Shokrollahi, Robert Bosch GmbH, Germany
Matthew Smith, Leibniz Universität Hannover, Germany
Keiji Takeda, Keio University, Japan
Isamu Teranishi, NEC, Japan
Patrick Traynor, Georgia Institute of Technology, USA
Ersin Uzun, PARC, USA
Michael Wiener, Irdeto, Canada
Akira Yamada, KDDI R&D Labs, Japan

This conference is organized annually by the International Financial Cryptography Association.

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
BDE 2025   2025 7th International Conference on Big Data Engineering (BDE 2025)
ICIME--EI 2025   2025 13th International Conference on Information Management and Engineering (ICIME 2025)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
SECRYPT 2025   22nd International Conference on Security and Cryptography
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
IJCIS 2024   International Journal on Cryptography and Information Security