posted by organizer: dcsec_uni_hannover || 4776 views || tracked by 5 users: [display]

WAHC 2015 : 3rd Workshop on Encrypted Computing and Applied Homomorphic Cryptography

FacebookTwitterLinkedInGoogle

Link: https://www.dcsec.uni-hannover.de/wahc15
 
When Jan 30, 2015 - Jan 30, 2015
Where Isla Verde, Puerto Rico
Submission Deadline Oct 16, 2014
Notification Due Nov 16, 2014
Final Version Due Dec 31, 2014
Categories    computer security   encryption   cryptography
 

Call For Papers

Associated with Financial Crypto & Data Security 2015

The cloud hype and recent disclosures show there is demand for secure and practical computing technologies. The workshop addresses the challenge to safely outsource data processing onto remote computing resources by protecting programs and data even during processing. This allows users to confidently outsource computation over confidential information independently from the trustworthiness or the security level of the remote delegate. The technologies and techniques discussed in this workshop are key to extend the range of applications that can be securely and practically outsourced.

The goal of the workshop is to bring together researchers, practitioners, government and industry to present, discuss and share the latest progress in the field relevant to real­world problems with practial approaches and solutions.



Topics include (but are not limited to)

Implementation of homomorphic encryption schemes
Practical performance evaluations of homomorphic encryption schemes
Practical aspects of functional encryption
Software architectures for encrypted applications
Platform and system integration for encrypted applications
Algorithmic primitives for encrypted applications
Encrypted search schemes
Encrypted e-payment solutions
Encrypted financial transactions
Encrypted applications in bio-informatics
Hybrid (partly encrypted) applications
Hardware implementations of encrypted computing
Secure information sharing

== Intended audience

Professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, encrypted computing, functional encryption and secure function evaluation, private information retrieval and searchable encryption.

== Schedule

Submission deadline: Oct. 16, 2014
Acceptance Notification: Nov. 16, 2014
Camera Ready Due: Dec. 31, 2014
Workshop: Jan. 30, 2015

== Submission

Accepted papers will be published in an LNCS volume (as part of the main FC '15 proceedings or collected in a subsidiary workshop proceedings). Submissions are limited to 12 pages including references and appendices. Authors are invited to submit anonymous versions of their papers for initial review via the submission server:

https://easychair.org/conferences/?conf=wahc15

Referees will do their best to avoid identification of authors of anonymous papers during the review process.

== Registration

Workshop participants register through the main conference site.

== Organizing Commitee

Michael Brenner, Leibniz Universität Hannover, Germany
Kurt Rohloff, NJIT, USA

== Program Committee

Dan Bogdanov, Cybernetica, Estonia
Kevin Butler, University of Florida, USA
David Cousins, BBN, USA
Dario Fiore, IMDEA Software Institute, Madrid, Spain
Shai Halevi, IBM, USA
Vladimir Kolesnikov, Bell Labs, USA
Tancrède Lepoint, CryptoExperts, France
David Naccache, Ecole Normale Superieure, Paris, France
Michael Naehrig, Microsoft, USA
Maire O'Neill, Queen's University Belfast, UK
Pascal Paillier, CryptoExperts, France
Benny Pinkas, Bar Ilan University, Israel
Christoph Sorge, Universitaet Saarland, Germany
Osman Ugus, Exceet Secure Solutions, Germany
Yevgeniy Vahlis, University of Toronto, Canada
Marten van Dijk, University of Connecticut, USA
Fre Vercauteren, Katholieke Universiteit Leuven, Belgium
Adrian Waller, Thales, UK

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
SECRYPT 2025   22nd International Conference on Security and Cryptography
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
SEAS 2025   14th International Conference on Software Engineering and Applications
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
ICISSP 2025   11th International Conference on Information Systems Security and Privacy
SOEA 2025   9th International Conference on Software Engineering and Applications
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 1