Short indicative submissions are preferred, preferably no more than 2000 words. You will have the opportunity to extend and revise your paper both before the pre-proceedings are issued, and again after the workshop.
The theme is "Evolving Security", but the term "security protocol" is to be interpreted broadly.
Security protocols evolve: security requirements evolve, and so do security mechanisms. Just to keep things fair, attackers have been evolving their agenda and capabilities as well. And, of course, there are the protocols that refuse to evolve, despite selection pressure to do so: what are they, and when will they go extinct?
Evolution itself is also a potential source of conceptual inspiration for designing new security processes and models. Is our password-shaped appendix still useful? Does natural selection really apply to all security protocols, or only in some contexts? To what extent are security properties epigenetic? What does security “fitness” even mean?
|