posted by organizer: mstamat || 27015 views || tracked by 64 users: [display]

ESORICS 2016 : European Symposium on Research in Computer Security

FacebookTwitterLinkedInGoogle


Conference Series : European Symposium on Research in Computer Security
 
Link: http://www.ics.forth.gr/esorics2016/
 
When Sep 26, 2016 - Sep 30, 2016
Where Heraklion, Greece
Submission Deadline Apr 22, 2016
Notification Due Jun 27, 2016
Final Version Due Jul 11, 2016
Categories    security   privacy
 

Call For Papers

=====================================================================
Call for Papers: ESORICS 2016
21st European Symposium on Research in Computer Security
Heraklion, Crete -- September 26-30, 2016
=====================================================================

WWW: http://bit.ly/esorics2016 / http://www.ics.forth.gr/esorics2016/
Twitter: @sharcs_project, Hashtag: #esorics2016

Overview
------------------------------------
ESORICS is the annual European research event in Computer Security.
The Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the
academic and industrial communities. Papers offering novel research
contributions in computer security are solicited for submission to the
Symposium. The primary focus is on original, high quality, unpublished
research and implementation experiences. We encourage submissions of
papers discussing industrial research and development.


Important Dates
------------------------------------
* Submission due: May 1, 2016 (***EXTENDED***)
* Notification to authors: June 27, 2016
* Camera ready due: July 11, 2016


Topics of Interest
------------------------------------
Topics of interest include, but are not limited to:
* access control
* accountability
* ad hoc networks
* anonymity
* applied cryptography
* authentication
* biometrics
* data and computation integrity
* database security
* data protection
* digital content protection
* digital forensics
* distributed systems security
* embedded systems security
* inference control
* information hiding
* identity management
* information flow control
* information security governance and management
* intrusion detection
* formal security methods
* language-based security
* network security
* phishing and spam prevention
* privacy
* privacy preserving data mining
* risk analysis and management
* secure electronic voting
* security architectures
* security economics
* security metrics
* security models
* security and privacy for big data
* security and privacy in cloud scenarios
* security and privacy in complex systems
* security and privacy in content centric networking
* security and privacy in crowdsourcing
* security and privacy in the IoT
* security and privacy in location services
* security and privacy for mobile code
* security and privacy in pervasive / ubiquitous computing
* security and privacy policies
* security and privacy in social networks
* security and privacy in web services
* security and privacy in cyber-physical systems
* security, privacy and resilience in critical infrastructures
* security verification
* software security
* systems security
* trust models and management
* trustworthy user devices
* usable security and privacy
* web security
* wireless security


Paper Submission Guidelines
------------------------------------
Submissions must be made through EasyChair at:
https://easychair.org/conferences/?conf=esorics2016

Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. The conference proceedings will be
published by Springer in the Lecture Notes in Computer Science series
(LNCS).

All submissions should follow the LNCS template from the time they are
submitted. Submitted papers should be at most 16 pages (using 10-point
font), excluding the bibliography and well-marked appendices, and at
most 20 pages total. Committee members are not required to read the
appendices, so the paper should be intelligible without them. All
submissions must be written in English. Submissions are to be made to
the Submission web site. Only pdf files will be accepted.
Submissions are not anonymous.

Submissions not meeting these guidelines risk rejection without
consideration of their merits. Authors of accepted papers must
guarantee that their papers will be presented at the conference.

Papers must be received by the aforementioned dates, 11:59 p.m.
American Samoa time (UTC-11).


Organisation Committee
------------------------------------
General Chairs:
* Ioannis Askoxylakis, FORTH, GR
* Sotiris Ioannidis, FORTH, GR

Program Committee Chairs:
* Sokratis Katsikas, Norwegian University of Science and Technology, NO
* Catherine Meadows, Naval Research Laboratory, US

Program Committee:
* Gail-Joon Ahn, Arizona State University, US
* Magnus Almgren, Chalmers University of Technology, SE
* Manos Antonakakis, Georgia Institute of Technology, US
* Alessandro Armando, DIBRIS - University of Genova, IT
* Michael Backes, Saarland University and
Max Planck Institute for Software Systems, DE
* Feng Bao, Security & Privacy Lab, Huawei, CN
* Giampaolo Bella, University of Catania, IT
* Carlo Blundo, Università degli Studi di Salerno, IT
* Rainer Boehme, University of Innsbruck, AT
* Stefan Brunthaler, SBA Researh, DE
* Christian Cachin, IBM Research - Zurich, CH
* Liqun Chen, Hewlett Packard Labs, UK
* Tom Chothia, University of Birmingham, UK
* Sherman Chow, Chinese University of Hong Kong, CN
* Cas Cremers, University of Oxford, UK
* Frédéric Cuppens, Telecom Bretagne, FR
* Nora Cuppens-Boulahia, Telecom Bretagne, FR
* Mads Dam, KTH, SE
* Sabrina De Capitani di Vimercati, Università degli
Studi di Milano, IT
* Hervé Debar, Télécom SudParis, FR
* Roberto di Pietro, University of Rome III, IT
* Josep Domingo-Ferrer, Universitat Rovira i Virgili, ES
* Pavlos Efraimidis, Democritus University of Thrace, GR
* Hannes Federrath, University of Hamburg, DE
* Simone Fischer-Hübner, Karlstad University, SE
* Riccardo Focardi, Università Ca' Foscari, Venezia, IT
* Simon Foley, University College Cork, IE
* Sara Foresti, Universita degli Studi di Milano, IT
* Katrin Franke, Norwegian University of Science & Technology, NO
* Felix Freiling, Friedrich-Alexander-Universität
Erlangen-Nürnberg, DE
* Dieter Gollmann, Hamburg University of Technology, DE
* Dimitris Gritzalis, Athens University of Economics
and Business, GR
* Stefanos Gritzalis, University of the Aegean, GR
* Joshua Guttman, Worcester Polytechnic Institute, US
* Gerhard Hancke, City University of Hong Kong, CN
* Marit Hansen, Independent Center for Privacy Protection
Schleswig-Holstein, DE
* Feng Hao, Newcastle University, UK
* Xinyi Huang, Fujian Normal University, CN
* Michael Huth, Imperial College London, UK
* Aaron D. Jaggard, Naval Research Laboratory, US
* Sushil Jajodia, George Mason University, US
* Vasilios Katos, Bournemouth University, UK
* Dogan Kesdogan, University of Regensburg, DE
* Kwangjo Kim, KAIST, KR
* Steve Kremer, INRIA Nancy - Grand Est, FR
* Ralf Kuesters, University of Trier, DE
* Junzuo Lai, Singapore Management University, SG
* Costas Lambrinoudakis, University of Piraeus, GR
* Peeter Laud, Cybernetica AS, EE
* Adam J. Lee, University of Pittsburgh, US
* Ninghui Li, Purdue University, US
* Yingjiu Li, Singapore Management University, SG
* Antonio Lioy, Politecnico di Torino, IT
* Peng Liu, Pennsylvania State University, US
* Javier Lopez, University of Malaga, ES
* Antonio Maña, University of Malaga, ES
* Pratyusa Manadhata, HP Labs, US
* Luigi Mancini, Universita di Roma La Sapienza, IT
* Heiko Mantel, TU Darmstadt, DE
* Olivier Markowitch, Universite Libre de Bruxelles, BE
* Fabio Martinelli, IIT-CNR, IT
* John Mitchell, Stanford University, US
* Katerina Mitrokotsa, Chalmers University of Technology, SE
* Refik Molva, EURECOM, FR
* Charles Morisset, Newcastle University, UK
* Flemming Nielson, Technical University of Denmark, DK
* Rolf Oppliger, eSECURITY Technologies, CH
* Stefano Paraboschi, Universita di Bergamo, IT
* Dusko Pavlovic, University of Hawaii, US
* Roberto Perdisci, University of Georgia, US
* Olivier Pereira, Universite catholique de Louvain, BE
* Günther Pernul, Universität Regensburg, DE
* Wolter Pieters, TBM-ESS, Delft University of Technology, NL
* Michalis Polychronakis, Stony Brook University, US
* Joachim Posegga, University of Passau, DE
* Kui Ren, State University of New York at Buffalo, US
* Peter Ryan, University of Luxembourg, LU
* Andrei Sabelfeld, Chalmers University of Technology, SE
* Pierangela Samarati, Università degli Studi di Milano, IT
* Ravi Sandhu, University of Texas at San Antonio, US
* Ralf Sasse, ETH Zurich, CH
* Nitesh Saxena, University of Alabama at Birmingham, US
* Andreas Schaad, SAP, DE
* Steve Schneider, University of Surrey, UK
* Joerg Schwenk, Ruhr-Universität Bochum, DE
* Basit Shafiq, Lahore University of Management Sciences, PK
* Ben Smyth, Huawei French Resarch Center, FR
* Krzysztof Szczypiorski, Warsaw University of Technology, PL
* A Min Tjoa, Vienna University of Technology, AT
* Aggeliki Tsohou, Ionian University, GR
* Jaideep Vaidya, Rutgers University, US
* Vijay Varadharajan, Macquarie University, AU
* Luca Viganò, King's College London, UK
* Michael Waidner, Fraunhofer SIT, DE
* Cong Wang, City University of Hong Kong, CN
* Edgar Weippl, SBA Research, AT
* Christos Xenakis, University of Piraeus, GR
* Meng Yu, University of Texas at San Antonio, US
* Jianying Zhou, Institute for Infocomm Research, SG
* Sencun Zhu, Penn State University, US

Publicity Chairs:
* Manolis Stamatogiannakis, Vrije Universiteit Amsterdam, NL
* Youki Kadobayashi, NAIST, JP

Sponsors
------------------------------------
ESORICS 2016 is sponsored by:
* Huawei (http://huawei.com / @Huawei)

and Horizon 2020 projects:
* SHARCS (http://sharcs-project.eu / @sharcs_project)
* VirtuWind (http://virtuwind.eu)

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CGIP--EI 2025   2025 3rd International Conference on Computer Graphics and Image Processing (CGIP 2025)
SCID @ AsiaCCS 2025   The 2nd workshop on Security-Centric Strategies for Combating Information Disorder
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
MATHCS 2024   2nd International Conference on Mathematics, Computer Science & Engineering
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
CPAIOR 2024   International Conference on the Integration of Constraint Programming, Artificial Intelligence, and Operations Research