posted by user: kyuhlee || 27550 views || tracked by 61 users: [display]

ESORICS 2015 : ESORICS

FacebookTwitterLinkedInGoogle


Conference Series : European Symposium on Research in Computer Security
 
Link: http://esorics2015.sba-research.org/
 
When Sep 21, 2015 - Sep 25, 2015
Where Vienna, Austria
Submission Deadline Apr 4, 2015
Notification Due Jun 15, 2015
Final Version Due Jun 29, 2015
Categories    cyber security   security
 

Call For Papers

*** Deadline extended to April 13, 2015 (11:59 PM American Samoa time) ***


******************************************************************************
20th European Symposium on Research in Computer Security (ESORICS 2015)
Vienna, Austria -- September 23-25, 2015
http://www.esorics2015.sba-research.org
******************************************************************************

ESORICS is the annual European research event in Computer Security.
The Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the academic
and industrial communities. Papers offering novel research contributions
in computer security are solicited for submission to the Symposium.
The primary focus is on original, high quality, unpublished research
and implementation experiences. We encourage submissions of
papers discussing industrial research and development.
Topics of interest include, but are not limited to:

- access control
- accountability
- ad hoc networks
- anonymity
- applied cryptography
- authentication
- biometrics
- database security
- data protection
- digital content protection
- digital forensic
- distributed systems security
- electronic payments
- embedded systems security
- inference control
- information hiding
- identity management
- information flow control
- integrity
- intrusion detection
- formal security methods
- language-based security
- network security
- phishing and spam prevention
- privacy
- risk analysis and management
- secure electronic voting
- security architectures
- security economics
- security metrics
- security models
- security and privacy in cloud scenarios
- security and privacy in complex systems
- security and privacy in location services
- security and privacy for mobile code
- security and privacy in pervasive/ubiquitous computing
- security and privacy policies
- security and privacy in social networks
- security and privacy in web services
- security verification
- software security
- steganography
- systems security
- trust models and management
- trustworthy user devices
- web security
- wireless security


PAPER SUBMISSIONS
--------------------------
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. The proceedings will be published by
Springer in the the Lecture Notes in Computer Science series.

All submissions should follow the LNCS template
(http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0)
from the time they are submitted. Submitted papers should be
at most 16 pages (using 10-point font), excluding the bibliography and
well-marked appendices, and at most 20 pages total. Committee members
are not required to read the appendices, so the paper should be
intelligible without them. All submissions must be written in English.

Purely theoretical papers, e.g. in cryptography, must be explicit about
the relevance of the theory to the security of IT systems.

Submissions are to be made to the submission web site at
http://www.easychair.org/conferences/?conf=esorics2015.
Only pdf files will be accepted. Submissions not meeting these guidelines
risk rejection without consideration of their merits.
Papers must be received by the deadline of April 13, 2015 [extended].
Authors of accepted papers must guarantee that their papers will be
presented at the conference.
Submissions should not be anonymized.

IMPORTANT DATES
--------------------------
Paper submission due: extended to April 13, 2015 (11:59 PM American Samoa time) [extended]
Notification to authors: June 15, 2015
Camera ready due: June 29, 2015


KEYNOTE SPEAKERS
--------------------------
Sushil Jajodia
George Mason University Fairfax, US

Richard Clayton
University of Cambridge, UK


OFFICERS
--------------------------
GENERAL CHAIR
Guenther Pernul
University of Regensburg, Germany


PROGRAM CHAIRS
Peter Y A Ryan
University of Luxembourg, Luxembourg

Edgar Weippl
SBA Research & Vienna University of Technology, Austria


WORKSHOP CHAIR
Javier Lopez
University of Malaga, Spain


PROGRAM COMMITTTE
--------------------------
David A. Basin, ETH Zurich, Switzerland
Alessandro Armando, Universita` di Genova, Italy
Vijay Atluri, Rutgers University, USA
Michael Backes, Saarland University, Germany
Feng Bao, Security and Privacy Lab, Huawei, China
Giampaolo Bella, Universit‡ di Catania, Italy
Carlo Blundo, Universita` degli Studi di Salerno, Italy
John C. Mitchell, Stanford University, USA
Ran Canetti, Tel Aviv University, Israel
Liqun Chen, HP Labs, UK
Michael Clarkson, Cornell University, USA
Jason Crampton, University of London, UK
Cas Cremers, University of Oxford, UK
Frederic Cuppens, Telecom Bretagne, France
Nora Cuppens-Boulahia, Telecom Bretagne, France
Sabrina De Capitani di Vimercati, Universita` degli Studi di Milano, Italy
Wenliang Du, Syracuse University, USA
Dimitris E. Simos, SBA Research, Austria
Hannes Federrath, University of Hamburg, Germany
Simon Foley, University College Cork, Ireland
Sara Foresti, Universita` degli Studi di Milano, Italy
Michael Goldsmith, University of Oxford, UK
Dieter Gollmann, TU Hamburg-Harburg, Germany
Dimitris Gritzalis, AUEB, Greece
Joshua Guttman, MTIRE Corp and Worcester Polytechnic, USA
Feng Hao, Newcastle University, UK
Amir Herzberg, Bar-Ilan University, Israel
Xinyi Huang, Fujian Normal University, China
Michael Huth, Imperial College, UK
Sotiris Ioannidis, FORTH, Crete
Adam J. Lee, University of Pittsburgh, USA
Sushil Jajodia, George Mason University, USA
Markus Jakobsson, Qualcomm, USA
Sokratis K. Katsikas, University of Piraeus, Greece
Stefan Katzenbeisser, TU Darmstadt, Germany
Florian Kerschbaum, SAP, Germany
Steve Kremer, INRIA Nancy and LORIA, France
Wenke Lee, Georgia Institute of Technology, USA
Yingjiu Li, Singapore Management University, Singapore
Peng Liu, Pennsylvania State University, USA
Javier Lopez, University of Malaga, Spain
Wenjing Lou, Virginia Polytechnic Institute and State University, USA
Haibing Lu, Santa Clara University, USA
Roy Maxion, Carnegie Mellon University, USA
Catherine Meadows, Naval Research Laboratory, USA
Carroll Morgan, University of New South Wales, Australia
David Naccache, ENS, France
Rolf Oppliger, eSecurity Technologies, Switzerland
Stefano Paraboschi, Universita` degli Studi di Bergamo, Italy
Olivier Pereira, UCL Crypto Group, Belgium
Guenther Pernul, University of Regensburg, Germany
Bart Preneel, Katholieke Universiteit Leuven , Belgium
Jean-Jacques Quisquater, UCL, Belgium
Kui Ren, State University of New York, Buffalo, USA
Mark Ryan, University of Birmingham, UK
Ahmad-Reza Sadeghi, TU Darmstadt, Germany
Pierangela Samarati, Universita` degli Studi di Milano, Italy
Nitesh Saxena, University of Alabama at Birmingham, USA
Andreas Schaad, SAP, Germany
Steve Schneider, University of Surrey, UK
Basit Shafiq, Lahore University of Management Sciences, Pakistan
Einar Snekkenes, Gjovik University College, Norway
Philip Stark, University of California, Berkeley, USA
Vanessa Teague, University of Melbourne, Australia
Jaideep Vaidya, Rutgers University, USA
Paulo Verissimo, University of Luxembourg, Luxembourg
Luca Vigano, KingĂ­s College London, UK
Michael Waidner, TU Darmstadt, Germany
Cong Wang, City University of Hong Kong, China
Lingyu Wang, University of Concordia, Canada
Ting Yu, North Carolina State University, USA
Meng Yu, Virginia Commonwealth University, USA
Moti Yung, Google, USA
Jianying Zhou, Institute for Infocomm Research, Singapore
Sencun Zhu, Pennsylvania State University, USA

This call for papers and additional information about the conference
can be found at http://www.esorics2015.sba-research.org

Related Resources

ESORICS 2024   European Symposium on Research in Computer Security
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
STM 2024   20th International Workshop on Security and Trust Management (co-located with ESORICS 2024)
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
MATHCS 2024   2nd International Conference on Mathematics, Computer Science & Engineering
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
IJCSITY 2024   International Journal of Computational Science and Information Technology
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
MEAP 2024   7th International Conference on Mechanical Engineering & Applications