posted by user: PETS_2013 || 7404 views || tracked by 7 users: [display]

PETS 2013 : Privacy Enhancing Technologies Symposium

FacebookTwitterLinkedInGoogle


Conference Series : Privacy Enhancing Technologies
 
Link: http://petsymposium.org/2013/
 
When Jul 10, 2013 - Jul 12, 2013
Where Bloomington, Indiana
Abstract Registration Due Feb 15, 2013
Submission Deadline Feb 19, 2013
Notification Due Mar 30, 2013
Final Version Due Apr 27, 2013
Categories    privacy   anonymity   security
 

Call For Papers

========================================================
PETS 2013: 13th Privacy Enhancing Technologies Symposium
July 10-12, 2013, Bloomington, Indiana, USA
http://petsymposium.org/
CALL FOR PAPERS
========================================================


The Privacy Enhancing Technologies Symposium (PETS) aims to advance the
state of the art and foster a world-wide community of researchers and
practitioners to discuss innovation and new perspectives.
Papers should present novel theoretical or practical research into the
design, analysis, experimentation, or fielding of privacy-enhancing
technologies. While PETS has traditionally been home to research on
anonymity systems, we strongly encourage submissions in topics such as
cryptography, HCI, data privacy, and in emerging areas (e.g., mobile,
social, cloud, ubiquitous). Some suggested topics are listed below.


KEY DATES (All deadlines are firm)

. Abstract submission: February 15, 2013, 23:59 GMT
. Paper submission deadline: February 19, 2013, 23:59 GMT
. Author notification: March 30, 2013
. Camera-ready deadline: April 27, 2013


TOPICS OF INTEREST

. Behavioral targeting
. Building and deploying privacy-enhancing systems
. Cryptographic tools for privacy
. Data protection technologies
. Differential and crowd-blending privacy
. Economics of privacy and game-theoretical approaches to privacy
. Forensics and privacy
. Information leakage and attacks on privacy
. Interdisciplinary research connecting privacy with economics, law,
ethnography, psychology, medicine, biotechnology
. Location and mobility privacy
. Policy languages and tools for privacy
. Privacy in ubiquitous computing and mobile devices
. Privacy in cloud and big-data applications
. Privacy in social networks and microblogging systems
. Privacy-enhanced access control, authentication, and identity management
. Profiling and data mining
. Reliability, robustness, and abuse prevention in privacy systems
. Systems for anonymous communications and censorship resistance
. Traffic analysis
. Transparency enhancing tools
. Usability and user-centered design for PETs


ORGANIZATION

General Chair
XiaoFeng Wang (Indiana University, Bloomington)

Program Co-Chairs
Emiliano De Cristofaro (PARC) and Matthew Wright (UTA)

Program Committee
. Alessandro Acquisti, Carnegie Mellon University
. Kevin Bauer, MIT Lincoln Laboratory
. Michael Brennan, Drexel University
. Srdjan Capkun, ETH Zurich
. Claude Castelluccia, INRIA Rhone-Alpes
. Alexei Czeskis, University of Washington
. George Danezis, Microsoft Research Cambridge
. Roger Dingledine, The Tor Project
. Simone Fischer-Huebner, Karlstad University
. Julien Freudiger, PARC
. Xinwen Fu, University of Massachusetts Lowell
. Seda Gurses, K.U. Leuven
. Michael Hay, Colgate University
. Jean-Pierre Hubaux, EPFL
. Aaron Johnson, U.S. Naval Research Laboratory
. Jaeyeon Jung, Microsoft Research Redmond
. Apu Kapadia, Indiana University Bloomington
. Markulf Kohlweiss, Microsoft Research Cambridge
. Balachander Krishnamurthy, AT&T Labs—Research
. Adam J. Lee, University of Pittsburgh
. Anja Lehmann, IBM Research—Zurich
. Marc Liberatore, University of Massachusetts Amherst
. Janne Lindqvist, Rutgers University
. Benjamin Livshits, Microsoft Research Redmond
. Damon McCoy, George Mason University
. Prateek Mittal, University of California, Berkeley
. Gregory Neven, IBM Research—Zurich
. Melek Önen, Eurecom
. Siani Pearson, HP Labs, Bristol
. Alessandra Sala, Bell Labs Ireland
. Pierangela Samarati, Università degli Studi di Milano
. Elaine Shi, University of Maryland, College Park
. Reza Shokri, EPFL
. Radu Sion, Stony Brook University
. Jessica Staddon, Google
. Carmela Troncoso, Gradiant
. Eugene Vasserman, Kansas State University
. Lingyu Wang, Concordia University
. Ting Yu, North Carolina State University
. Nan Zhang, The George Washington University



ETHICS

Papers describing experiments with users or user data (e.g. network
traffic), should follow the basic principles of ethical research, e.g.,
beneficence (maximizing the benefits to an individual or to society while
minimizing harm to the individual), minimal risk (appropriateness of the
risk versus benefit ratio), voluntary consent, respect for privacy, and
limited deception. Authors may be asked to include explanation of how
ethical principles were followed in their final papers should questions
arise during the review process.


PANEL SUBMISSIONS

We also invite proposals of up to 2 pages for panel discussions or other
relevant presentations. In your proposal, (1) describe the nature of the
presentation and why it is appropriate to the symposium, (2) suggest a
duration for the presentation (ideally between 45 and 90 minutes), and
(3) suggest some possible presenters.


ADDITIONAL INFORMATION

Please see complete Call for Papers at
http://petsymposium.org/2013/cfp.php for additional information on
submission guidelines and copyright agreements.


HELP PUBLICIZE PETS

If you would like to help publicize PETS within your organization, you are
welcome to circulate this email as well as to print and use the flyer at
http://petsymposium.org/2013/files/pets_flyer.pdf
You can also follow PETS on Twitter: https://twitter.com/PETS_2013

Related Resources

PETS 2020   20th Privacy Enhancing Technologies Symposium
PST 2020   18th Annual International Conference on Privacy, Security, and Trust (PST2020)
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
CPCS 2020   Call for Chapters: Security and Privacy in Cyber-Physical Systems: Threats and Defenses
SPIoT 2020   9th International Symposium on Security and Privacy on the Internet of Things
CANS 2020   Cryptology and Network Security
MoWiN 2020   9th International Conference on Mobile & Wireless Networks
NCWMC 2020   5th International Conference on Networks, Communications, Wireless and Mobile Computing
CCCIOT 2020   International Conference on Cloud Computing and IOT (CCCIOT 2020)
BDTA 2020   BDTA 2020 - 10th EAI International Conference on Big Data Technologies and Applications