posted by user: ardagna || 15237 views || tracked by 39 users: [display]

ESORICS 2011 : European Symposium on Research in Computer Security


Conference Series : European Symposium on Research in Computer Security
When Sep 12, 2011 - Sep 14, 2011
Where Leuven, Belgium
Submission Deadline Mar 21, 2011
Notification Due May 20, 2011
Final Version Due Jun 17, 2011
Categories    security

Call For Papers

[Apologies if you receive multiple copies of this message]


European Symposium on Research in Computer Security (ESORICS 2011)
September 12-14, 2011, Leuven, Belgium

ESORICS is the annual European research event in Computer Security. The
Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the
academic and industrial communities. Papers offering novel research
contributions in computer security are solicited for submission to the
Symposium. The primary focus is on original, high quality, unpublished
research and implementation experiences. Submitted papers must not
substantially overlap with papers that have been published or that are
simultaneously submitted to a journal or a conference with proceedings.
We encourage submissions of papers discussing industrial research and

Suggested topics include but are not restricted to:

* Access Control
* Accountability
* Ad hoc Networks
* Anonymity
* Applied Cryptography
* Attacks and Viral Software
* Authentication and Delegation
* Biometrics
* Database Security
* Digital Content Protection
* Distributed Systems Security
* Electronic Payments
* Embedded Systems Security
* Inference Control
* Information Hiding
* Identity Management
* Information Flow Control
* Integrity
* Intrusion Detection
* Formal Security Methods
* Language-Based Security
* Network Security
* Phishing and Spam Prevention
* Privacy
* Risk Analysis and Management
* Secure Electronic Voting
* Security Architectures
* Security Economics
* Security and Privacy Policies
* Security for Mobile Code
* Security in Location Services
* Security in Social Networks
* Security Models
* Security Verification
* Software Security
* Steganography
* Systems Security
* Trust Models and Management
* Trustworthy User Devices
* Web Security
* Wireless Security


Submission of papers: March 21, 2011 23:59 PST *FIRM - NO extensions*
Notification to authors: May 20, 2011
Camera-ready copies: June 17, 2011


The proceedings will be published by Springer in the LNCS Series. All
submissions should follow the LNCS template from the time they are
submitted. They should be at most 16 pages (using 11-point font),
excluding the bibliography and well-marked appendices. Committee members
are not required to read the appendices, so the paper should be
intelligible without them. All submissions must be written in English.

Authors must submit their papers by March 21, 2011, using the symposium
web site and following the requirements stated there.

All accepted papers should be presented at the Symposium; therefore,
their authors must be prepared to sign a copyright transfer statement.
At least one author of each accepted paper must register to the
symposium, by the early date indicated by the organizers, and present
the paper.


* Bart Preneel, K.U.Leuven


* Vijay Atluri, Rutgers University
* Claudia Diaz, K.U.Leuven


* Claudio Ardagna, Universita' degli Studi di Milano


* Mikhail Atallah, Purdue University (US)
* Michael Backes, Saarland University and MPI-SWS (D)
* Feng Bao, Institute for Infocomm Research (SG)
* Lujo Bauer, Carnegie Mellon University (US)
* Carlo Blundo, Universita' di Salerno (I)
* Jan Camenisch, IBM Research - Zurich (CH)
* Srdjan Capkun, ETH Zurich (CH)
* Veronique Cortier, LORIA-CNRS (F)
* Jason Crampton, Royal Holloway, University of London (UK)
* Frederic Cuppens, IT TELECOM Bretagne (F)
* George Danezis, Microsoft Research (UK)
* Sabrina De Capitani di Vimercati, Universita' degli Studi di Milano (I)
* Roger Dingledine, The Tor Project (US)
* Orr Dunkelman, Weizmann Institute (IL)
* Simon Foley, University College Cork (IE)
* Dieter Gollmann, Hamburg University of Technology (D)
* Thorsten Holz, Ruhr-University Bochum (D)
* Sushil Jajodia, George Mason University (US)
* Stefan Katzenbeisser, T.U. Darmstadt (D)
* Angelos Keromytis, Columbia University (US)
* Aggelos Kiayias, University of Athens (GR)
* Michiharu Kudo, IBM Research - Tokyo (J)
* Klaus Kursawe, University of Nijmegen (NL)
* Adam Lee, University of Pittsburgh (US)
* Ronald Leenes, University of Tilburg / TILT (NL)
* Peng Liu, Pennsylvania State University (US)
* Javier Lopez, University of Malaga (E)
* David Molnar, Microsoft Research (US)
* Steven Murdoch, University of Cambridge (UK)
* Gregory Neven, IBM Research - Zurich (CH)
* Radia Perlman, Intel Corporation (US)
* Indrakshi Ray, Colorado State University (US)
* Ahmad-Reza Sadeghi, Ruhr-University Bochum (D)
* Rei Safavi-Naini, University of Calgary (CA)
* Pierangela Samarati, Universita' degli Studi di Milano (I)
* R. Sekar, Stony Brook University (US)
* Basit Shafiq, Rutgers University (US)
* Vitaly Shmatikov, University of Texas Austin (US)
* Einar Snekkenes, Gjovik University College (NO)
* Paul Syverson, Naval Research Laboratory (US)
* Patrick Traynor, Georgia Institute of Technology (US)
* Carmela Troncoso, K.U.Leuven (BE)
* Jaideep Vaidya, Rutgers University (US)
* Will Winsborough, University of Texas at San Antonio (US)

Related Resources

FCSIT 2020   2020 2nd Euro-Asia Conference on Frontiers of Computer Science and Information Technology (FCSIT 2020)
AVC 2020   Advances in Vision Computing: An International Journal
ICPR-IETBiom-VSaaS 2021   25th ICPR Special Issue on Real-Time Visual Surveillance as-a-Service (VSaaS) for Smart Security Solutions in IET Biometrics
JSE 2020   9th International Conference on Software Engineering and Applications
ECCSIT 2021   2021 European Conference on Computer Science and Information Technology (ECCSIT 2021)
CCNET 2020   7th International Conference on Computer Networks & Communications
KJAR 2020   Call for Paper: Kurdistan Journal of Applied Research - Volume 5 - issue 1 - June 2020
CSW 2021   2021 International Workshop on Cyber Security (CSW 2021)
TrustCom 2020   The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
EISIC 2020   2020 European Intelligence and Security Informatics Conference