posted by organizer: comqjam || 5686 views || tracked by 4 users: [display]

SPW 2016 : International Workshop on Security Protocols

FacebookTwitterLinkedInGoogle

Link: http://www.engr.mun.ca/~spw2016/
 
When Apr 6, 2016 - Apr 8, 2016
Where Brno, Czech Republic
Submission Deadline Jan 31, 2016
Categories    security   security protocols   evolution   security model
 

Call For Papers

Short indicative submissions are preferred, preferably no more than 2000 words. You will have the opportunity to extend and revise your paper both before the pre-proceedings are issued, and again after the workshop.

The theme is "Evolving Security", but the term "security protocol" is to be interpreted broadly.

Security protocols evolve: security requirements evolve, and so do security mechanisms. Just to keep things fair, attackers have been evolving their agenda and capabilities as well. And, of course, there are the protocols that refuse to evolve, despite selection pressure to do so: what are they, and when will they go extinct?

Evolution itself is also a potential source of conceptual inspiration for designing new security processes and models. Is our password-shaped appendix still useful? Does natural selection really apply to all security protocols, or only in some contexts? To what extent are security properties epigenetic? What does security “fitness” even mean?

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
CSW 2024   2024 3rd International Conference on Cyber Security
ICNP 2024   International Conference on Network Protocols
ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
IOTCB 2024   3rd International Conference on IOT, Cloud and Big Data
S&P 2025   The 45th IEEE Symposium on Security and Privacy
ECCWS 2024   23rd European Conference on Cyber Warfare and Security