| |||||||||||||||
ESORICS 2016 : European Symposium on Research in Computer SecurityConference Series : European Symposium on Research in Computer Security | |||||||||||||||
Link: http://www.ics.forth.gr/esorics2016/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
=====================================================================
Call for Papers: ESORICS 2016 21st European Symposium on Research in Computer Security Heraklion, Crete -- September 26-30, 2016 ===================================================================== WWW: http://bit.ly/esorics2016 / http://www.ics.forth.gr/esorics2016/ Twitter: @sharcs_project, Hashtag: #esorics2016 Overview ------------------------------------ ESORICS is the annual European research event in Computer Security. The Symposium started in 1990 and has been held in several European countries, attracting a wide international audience from both the academic and industrial communities. Papers offering novel research contributions in computer security are solicited for submission to the Symposium. The primary focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers discussing industrial research and development. Important Dates ------------------------------------ * Submission due: May 1, 2016 (***EXTENDED***) * Notification to authors: June 27, 2016 * Camera ready due: July 11, 2016 Topics of Interest ------------------------------------ Topics of interest include, but are not limited to: * access control * accountability * ad hoc networks * anonymity * applied cryptography * authentication * biometrics * data and computation integrity * database security * data protection * digital content protection * digital forensics * distributed systems security * embedded systems security * inference control * information hiding * identity management * information flow control * information security governance and management * intrusion detection * formal security methods * language-based security * network security * phishing and spam prevention * privacy * privacy preserving data mining * risk analysis and management * secure electronic voting * security architectures * security economics * security metrics * security models * security and privacy for big data * security and privacy in cloud scenarios * security and privacy in complex systems * security and privacy in content centric networking * security and privacy in crowdsourcing * security and privacy in the IoT * security and privacy in location services * security and privacy for mobile code * security and privacy in pervasive / ubiquitous computing * security and privacy policies * security and privacy in social networks * security and privacy in web services * security and privacy in cyber-physical systems * security, privacy and resilience in critical infrastructures * security verification * software security * systems security * trust models and management * trustworthy user devices * usable security and privacy * web security * wireless security Paper Submission Guidelines ------------------------------------ Submissions must be made through EasyChair at: https://easychair.org/conferences/?conf=esorics2016 Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. The conference proceedings will be published by Springer in the Lecture Notes in Computer Science series (LNCS). All submissions should follow the LNCS template from the time they are submitted. Submitted papers should be at most 16 pages (using 10-point font), excluding the bibliography and well-marked appendices, and at most 20 pages total. Committee members are not required to read the appendices, so the paper should be intelligible without them. All submissions must be written in English. Submissions are to be made to the Submission web site. Only pdf files will be accepted. Submissions are not anonymous. Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors of accepted papers must guarantee that their papers will be presented at the conference. Papers must be received by the aforementioned dates, 11:59 p.m. American Samoa time (UTC-11). Organisation Committee ------------------------------------ General Chairs: * Ioannis Askoxylakis, FORTH, GR * Sotiris Ioannidis, FORTH, GR Program Committee Chairs: * Sokratis Katsikas, Norwegian University of Science and Technology, NO * Catherine Meadows, Naval Research Laboratory, US Program Committee: * Gail-Joon Ahn, Arizona State University, US * Magnus Almgren, Chalmers University of Technology, SE * Manos Antonakakis, Georgia Institute of Technology, US * Alessandro Armando, DIBRIS - University of Genova, IT * Michael Backes, Saarland University and Max Planck Institute for Software Systems, DE * Feng Bao, Security & Privacy Lab, Huawei, CN * Giampaolo Bella, University of Catania, IT * Carlo Blundo, Università degli Studi di Salerno, IT * Rainer Boehme, University of Innsbruck, AT * Stefan Brunthaler, SBA Researh, DE * Christian Cachin, IBM Research - Zurich, CH * Liqun Chen, Hewlett Packard Labs, UK * Tom Chothia, University of Birmingham, UK * Sherman Chow, Chinese University of Hong Kong, CN * Cas Cremers, University of Oxford, UK * Frédéric Cuppens, Telecom Bretagne, FR * Nora Cuppens-Boulahia, Telecom Bretagne, FR * Mads Dam, KTH, SE * Sabrina De Capitani di Vimercati, Università degli Studi di Milano, IT * Hervé Debar, Télécom SudParis, FR * Roberto di Pietro, University of Rome III, IT * Josep Domingo-Ferrer, Universitat Rovira i Virgili, ES * Pavlos Efraimidis, Democritus University of Thrace, GR * Hannes Federrath, University of Hamburg, DE * Simone Fischer-Hübner, Karlstad University, SE * Riccardo Focardi, Università Ca' Foscari, Venezia, IT * Simon Foley, University College Cork, IE * Sara Foresti, Universita degli Studi di Milano, IT * Katrin Franke, Norwegian University of Science & Technology, NO * Felix Freiling, Friedrich-Alexander-Universität Erlangen-Nürnberg, DE * Dieter Gollmann, Hamburg University of Technology, DE * Dimitris Gritzalis, Athens University of Economics and Business, GR * Stefanos Gritzalis, University of the Aegean, GR * Joshua Guttman, Worcester Polytechnic Institute, US * Gerhard Hancke, City University of Hong Kong, CN * Marit Hansen, Independent Center for Privacy Protection Schleswig-Holstein, DE * Feng Hao, Newcastle University, UK * Xinyi Huang, Fujian Normal University, CN * Michael Huth, Imperial College London, UK * Aaron D. Jaggard, Naval Research Laboratory, US * Sushil Jajodia, George Mason University, US * Vasilios Katos, Bournemouth University, UK * Dogan Kesdogan, University of Regensburg, DE * Kwangjo Kim, KAIST, KR * Steve Kremer, INRIA Nancy - Grand Est, FR * Ralf Kuesters, University of Trier, DE * Junzuo Lai, Singapore Management University, SG * Costas Lambrinoudakis, University of Piraeus, GR * Peeter Laud, Cybernetica AS, EE * Adam J. Lee, University of Pittsburgh, US * Ninghui Li, Purdue University, US * Yingjiu Li, Singapore Management University, SG * Antonio Lioy, Politecnico di Torino, IT * Peng Liu, Pennsylvania State University, US * Javier Lopez, University of Malaga, ES * Antonio Maña, University of Malaga, ES * Pratyusa Manadhata, HP Labs, US * Luigi Mancini, Universita di Roma La Sapienza, IT * Heiko Mantel, TU Darmstadt, DE * Olivier Markowitch, Universite Libre de Bruxelles, BE * Fabio Martinelli, IIT-CNR, IT * John Mitchell, Stanford University, US * Katerina Mitrokotsa, Chalmers University of Technology, SE * Refik Molva, EURECOM, FR * Charles Morisset, Newcastle University, UK * Flemming Nielson, Technical University of Denmark, DK * Rolf Oppliger, eSECURITY Technologies, CH * Stefano Paraboschi, Universita di Bergamo, IT * Dusko Pavlovic, University of Hawaii, US * Roberto Perdisci, University of Georgia, US * Olivier Pereira, Universite catholique de Louvain, BE * Günther Pernul, Universität Regensburg, DE * Wolter Pieters, TBM-ESS, Delft University of Technology, NL * Michalis Polychronakis, Stony Brook University, US * Joachim Posegga, University of Passau, DE * Kui Ren, State University of New York at Buffalo, US * Peter Ryan, University of Luxembourg, LU * Andrei Sabelfeld, Chalmers University of Technology, SE * Pierangela Samarati, Università degli Studi di Milano, IT * Ravi Sandhu, University of Texas at San Antonio, US * Ralf Sasse, ETH Zurich, CH * Nitesh Saxena, University of Alabama at Birmingham, US * Andreas Schaad, SAP, DE * Steve Schneider, University of Surrey, UK * Joerg Schwenk, Ruhr-Universität Bochum, DE * Basit Shafiq, Lahore University of Management Sciences, PK * Ben Smyth, Huawei French Resarch Center, FR * Krzysztof Szczypiorski, Warsaw University of Technology, PL * A Min Tjoa, Vienna University of Technology, AT * Aggeliki Tsohou, Ionian University, GR * Jaideep Vaidya, Rutgers University, US * Vijay Varadharajan, Macquarie University, AU * Luca Viganò, King's College London, UK * Michael Waidner, Fraunhofer SIT, DE * Cong Wang, City University of Hong Kong, CN * Edgar Weippl, SBA Research, AT * Christos Xenakis, University of Piraeus, GR * Meng Yu, University of Texas at San Antonio, US * Jianying Zhou, Institute for Infocomm Research, SG * Sencun Zhu, Penn State University, US Publicity Chairs: * Manolis Stamatogiannakis, Vrije Universiteit Amsterdam, NL * Youki Kadobayashi, NAIST, JP Sponsors ------------------------------------ ESORICS 2016 is sponsored by: * Huawei (http://huawei.com / @Huawei) and Horizon 2020 projects: * SHARCS (http://sharcs-project.eu / @sharcs_project) * VirtuWind (http://virtuwind.eu) |
|