posted by user: PETS_2013 || 7926 views || tracked by 7 users: [display]

PETS 2013 : Privacy Enhancing Technologies Symposium


Conference Series : Privacy Enhancing Technologies
When Jul 10, 2013 - Jul 12, 2013
Where Bloomington, Indiana
Abstract Registration Due Feb 15, 2013
Submission Deadline Feb 19, 2013
Notification Due Mar 30, 2013
Final Version Due Apr 27, 2013
Categories    privacy   anonymity   security

Call For Papers

PETS 2013: 13th Privacy Enhancing Technologies Symposium
July 10-12, 2013, Bloomington, Indiana, USA

The Privacy Enhancing Technologies Symposium (PETS) aims to advance the
state of the art and foster a world-wide community of researchers and
practitioners to discuss innovation and new perspectives.
Papers should present novel theoretical or practical research into the
design, analysis, experimentation, or fielding of privacy-enhancing
technologies. While PETS has traditionally been home to research on
anonymity systems, we strongly encourage submissions in topics such as
cryptography, HCI, data privacy, and in emerging areas (e.g., mobile,
social, cloud, ubiquitous). Some suggested topics are listed below.

KEY DATES (All deadlines are firm)

. Abstract submission: February 15, 2013, 23:59 GMT
. Paper submission deadline: February 19, 2013, 23:59 GMT
. Author notification: March 30, 2013
. Camera-ready deadline: April 27, 2013


. Behavioral targeting
. Building and deploying privacy-enhancing systems
. Cryptographic tools for privacy
. Data protection technologies
. Differential and crowd-blending privacy
. Economics of privacy and game-theoretical approaches to privacy
. Forensics and privacy
. Information leakage and attacks on privacy
. Interdisciplinary research connecting privacy with economics, law,
ethnography, psychology, medicine, biotechnology
. Location and mobility privacy
. Policy languages and tools for privacy
. Privacy in ubiquitous computing and mobile devices
. Privacy in cloud and big-data applications
. Privacy in social networks and microblogging systems
. Privacy-enhanced access control, authentication, and identity management
. Profiling and data mining
. Reliability, robustness, and abuse prevention in privacy systems
. Systems for anonymous communications and censorship resistance
. Traffic analysis
. Transparency enhancing tools
. Usability and user-centered design for PETs


General Chair
XiaoFeng Wang (Indiana University, Bloomington)

Program Co-Chairs
Emiliano De Cristofaro (PARC) and Matthew Wright (UTA)

Program Committee
. Alessandro Acquisti, Carnegie Mellon University
. Kevin Bauer, MIT Lincoln Laboratory
. Michael Brennan, Drexel University
. Srdjan Capkun, ETH Zurich
. Claude Castelluccia, INRIA Rhone-Alpes
. Alexei Czeskis, University of Washington
. George Danezis, Microsoft Research Cambridge
. Roger Dingledine, The Tor Project
. Simone Fischer-Huebner, Karlstad University
. Julien Freudiger, PARC
. Xinwen Fu, University of Massachusetts Lowell
. Seda Gurses, K.U. Leuven
. Michael Hay, Colgate University
. Jean-Pierre Hubaux, EPFL
. Aaron Johnson, U.S. Naval Research Laboratory
. Jaeyeon Jung, Microsoft Research Redmond
. Apu Kapadia, Indiana University Bloomington
. Markulf Kohlweiss, Microsoft Research Cambridge
. Balachander Krishnamurthy, AT&T Labs—Research
. Adam J. Lee, University of Pittsburgh
. Anja Lehmann, IBM Research—Zurich
. Marc Liberatore, University of Massachusetts Amherst
. Janne Lindqvist, Rutgers University
. Benjamin Livshits, Microsoft Research Redmond
. Damon McCoy, George Mason University
. Prateek Mittal, University of California, Berkeley
. Gregory Neven, IBM Research—Zurich
. Melek Önen, Eurecom
. Siani Pearson, HP Labs, Bristol
. Alessandra Sala, Bell Labs Ireland
. Pierangela Samarati, Università degli Studi di Milano
. Elaine Shi, University of Maryland, College Park
. Reza Shokri, EPFL
. Radu Sion, Stony Brook University
. Jessica Staddon, Google
. Carmela Troncoso, Gradiant
. Eugene Vasserman, Kansas State University
. Lingyu Wang, Concordia University
. Ting Yu, North Carolina State University
. Nan Zhang, The George Washington University


Papers describing experiments with users or user data (e.g. network
traffic), should follow the basic principles of ethical research, e.g.,
beneficence (maximizing the benefits to an individual or to society while
minimizing harm to the individual), minimal risk (appropriateness of the
risk versus benefit ratio), voluntary consent, respect for privacy, and
limited deception. Authors may be asked to include explanation of how
ethical principles were followed in their final papers should questions
arise during the review process.


We also invite proposals of up to 2 pages for panel discussions or other
relevant presentations. In your proposal, (1) describe the nature of the
presentation and why it is appropriate to the symposium, (2) suggest a
duration for the presentation (ideally between 45 and 90 minutes), and
(3) suggest some possible presenters.


Please see complete Call for Papers at for additional information on
submission guidelines and copyright agreements.


If you would like to help publicize PETS within your organization, you are
welcome to circulate this email as well as to print and use the flyer at
You can also follow PETS on Twitter:

Related Resources

SPBP 2021   The Fourth Workshop on Security and Privacy-enhanced Business Process Management
BES 2021   5th International Conference on Biomedical Engineering and Science
CENTRIC 2021   The Fourteenth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
CEVVE 2021   2021 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2021)
LPW 2021   Third Location Privacy Workshop
PETS 2021   21st Privacy Enhancing Technologies Symposium (Issue 4)
IJAIT 2021   International Journal of Advanced Information Technology
PETS 2021   21st Privacy Enhancing Technologies Symposium (Issue 3)
PETS 2021   21st Privacy Enhancing Technologies Symposium (Issue 2)