posted by user: ssr2018 || 2567 views || tracked by 4 users: [display]

SSR 2018 : Security Standardisation Research


When Dec 3, 2018 - Dec 4, 2018
Where Darmstadt, Germany
Submission Deadline Jun 22, 2018
Notification Due Aug 22, 2018
Final Version Due Sep 19, 2018
Categories    standardisation   information security   cryptography   cybersecurity

Call For Papers

Papers offering research contributions to the area of security standardisation are solicited for submission to the SSR 2018 conference. Papers may present theory, applications or practical experience in the field of security standardisation, including, but not necessarily limited to:

- access control
- biometrics
- cloud computing
- critical national infrastructure (CNI) protection
- consistency and comparison of multiple standards
- critiques of standards
- cryptanalysis
- cryptographic protocols
- cryptographic techniques
- evaluation criteria
- formal analysis of standards
- history of standardization
- identity management
- industrial control systems security
- internet security
- interoperability of standards
- intrusion detection
- key management and PKIs
- management of the standardisation process
- mobile security
- network security
- open standards and open source
- payment system security
- privacy
- regional and international standards
- RFID tag security
- risk analysis
- security controls
- security management
- security protocols
- security services
- security tokens
- smart cards
- telecommunications security
- trusted computing
- web security

New this year is that SSR will also accept Systematisation of Knowledge (SoK) papers relating to security standardisation, which integrate experience and previous research, drawing new comprehensive conclusions. SoK papers should evaluate, systematise, and contextualise existing knowledge. They should provide a new viewpoint, offer a comprehensive taxonomy, or cast doubt on long-held beliefs, based on compelling evidence. We also welcome SoK papers that document existing standardisation practices and analyse their weaknesses and strengths.

General Chair:
Marc Fischlin (TU Darmstadt, Germany)

Program Co-Chairs:
Cas Cremers (University of Oxford, UK)
Anja Lehmann (IBM Research – Zurich, Switzerland)

Program Committee:
Steve Babbage, Vodafone, UK
Liqun Chen, University of Surrey, UK
Jean Paul Degabriele, TU Darmstadt, Germany
Antoine Delignat-Lavaud, Microsoft Research, UK
Orr Dunkelman, University of Haifa, Israel
Cedric Fournet, Microsoft Research, UK
Britta Hale, Norwegian University of Science and Technology, Norway
Harry Halpin, INRIA, France
Tibor Jager, Paderborn University, Germany
John Kelsey, NIST, USA
Markulf Kohlweiss, University of Edinburgh, UK
Stephan Krenn, AIT Austrian Institute of Technology, Austria
Xuejia Lai, Shanghai Jiaotong University, China
Tancrede Lepoint, SRI International, USA
Peter Lipp, Graz University of Technology, Austria
Atul Luykx, Visa Research, USA
Catherine Meadows, Naval Research Laboratory, USA
David Naccache, ENS, France
Valtteri Niemi, University of Helsinki, Finland
Kenneth Paterson, Royal Holloway, University of London, UK
Eric Rescorla, Mozilla, USA
Matt Robshaw, Impinj, USA
Phillip Rogaway, University of California, Davis, USA
Mark Ryan, University of Birmingham, UK
Kazue Sako, NEC, Japan
Peter Schwabe, Radboud University, The Netherlands
Tom Shrimpton, University of Florida, USA
Ben Smyth, University of Luxembourg, Luxembourg
Douglas Stebila, McMaster University, Canada
Claire Vishik, Intel Corporation, UK
Michael Ward, MasterCard, UK
William Whyte, Security Innovation, USA

Instructions for Authors:
Submissions must be original and must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any journal or to any other conference or workshop that has published proceedings.

Authors submitting a systematisation of knowledge paper should have a title consisting of “SoK: Title”. This is to ensure that the committee is made aware that the paper is an SoK paper, and so will be reviewed with different criteria.

Submitted papers must be in PDF format and written in English. The submission must be anonymous with no author names, affiliations or obvious references. It should begin with a title, a short abstract, and an introduction. Papers should be at most 16 pages (excluding bibliography and appendices) in the standard LNCS format (see instructions at Reviewers are not obliged to read appendices, so the paper must be self-contained without them.

Papers that do not adhere to these requirements will be rejected without consideration of their merits.

Accepted papers will be presented at the conference and published in Springer’s Lecture Notes in Computer Science (LNCS) series. At least one author of each accepted paper must register for the conference.

Submission Site:
Papers must be submitted using the EasyChair system. The link will be provided on the conference website when the system is open for submissions.

Related Resources

SSR 2020   Security Standardisation Research 2020
IJCIS 2020   International Journal on Cryptography and Information Security
AsiaCCS 2021   The 16th ACM ASIA Conference on Computer and Communications Security [First Round]
JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
SPPR 2020   9th International Conference on Signal, Image Processing and Pattern Recognition
CSW 2021   2021 International Workshop on Cyber Security (CSW 2021)
MathSJ 2020   Applied Mathematics and Sciences: An International Journal
Oriental COCOSDA 2020   The 23rd Conference of the Oriental COCOSDA International Committee for the Co-ordination and Standardisation of Speech Databases and Assessment Techniques
CCNET 2020   7th International Conference on Computer Networks & Communications
USENIX Security 2021   30th USENIX Security Symposium (Winter Deadline)