Cipher
Calls for Papers



IEEE Computer Society's Technical Committee on Security and Privacy


 

Past Conferences and Journal Special Issues

Last Modified:12/17/18

Note: Please contact cipher-cfp@ieee-security.org by email if you have any questions..

Contents

 

Past Conferences and Other Announcements - 2018

ACSAC 2018 2018 Annual Computer Security Applications Conference, San Juan, Puerto Rico, USA, December 3-7, 2018. [posted here 5/14/18]
ACSAC brings together cutting edge researchers, with a broad cross-section of security professionals drawn from academia, industry, and government, gathered to present and discuss the latest security results and topics. With peer reviewed technical papers, invited talks, panels, national interest discussions, workshops, and professional development and training courses, ACSAC continues its core mission of investigating practical solutions for computer and network security technology. We plan to hold ACSAC at the Condado Plaza Hilton in San Juan, Puerto Rico. Centrally located in the trendy Condado Beach area, near historic Old San Juan, the hotel is an ideal location to both attend the conference and spend time relaxing and sightseeing in the warm tropical weather. While the island of Puerto Rico continues to recover and rebuild from the devastating impact of Hurricane Maria, we have been reassured that the hotel and San Juan will be ready for us in December. We plan to visit San Juan this summer to confirm its readiness. We invite you to submit your work to the conference. As an internationally recognized forum where practitioners, researchers, and developers meet to learn and to exchange practical ideas and experiences in computer and network security, we welcome your contributions. In addition to peer-reviewed papers on new work, we also welcome case studies on real-world applications, panels featuring interactive expert discussions, in-depth course on new and emerging topics, and workshops comprised of 1-2 days sessions on hot topics.

For more information, please see https://www.acsac.org.

NordSec 2018 23rd Nordic Conference on Secure IT Systems, Oslo, Norway, November 28-30, 2018. [posted here 03/26/18]
NordSec addresses a broad range of topics within IT security with the aim of bringing together computer security researchers and encouraging interaction between academia and industry. In addition to regular research paper submissions, we invite participants to present their ideas in poster sessions during lunches and coffee breaks. NordSec 2018 welcomes contributions within, but not limited to, the following areas:
- Access control and security models
- Applied cryptography
- Blockchains
- Cloud security
- Commercial security policies and enforcement
- Cryptanalysis
- Cryptographic protocols
- Cyber crime, warfare, and forensics
- Economic, legal, and social aspects of security
- Enterprise security
- Hardware and smart card security
- Mobile and embedded security
- Internet of Things and M2M security
- Internet, communication, and network security
- Intrusion detection
- Language-based techniques for security
- New ideas and paradigms in security
- Operating system security
- Privacy and anonymity
- Public-key cryptography
- Security and machine learning
- Security education and training
- Security evaluation and measurement
- Security management and audit
- Security protocols
- Security usability
- Social engineering and phishing
- Software security and malware
- Symmetric cryptography
- Trust and identity management
- Trusted computing
- Vulnerability testing
- Web application security

For more information, please see https://securitylab.no/nordsec18/.

ISDDC 2018 International Conference on Intelligent, Secure and Dependable Systems in Distributed and Cloud Environments, Vancouver, BC, Canada, November 28-30, 2018. [posted here 3/19/18]
This conference solicits papers addressing issues related to the design, analysis, and implementation, of dependable and secure infrastructures, systems, architectures, algorithms, and protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and IoT systems.

For more information, please see http://www.isddc.org/2018/.

SSR 2018 4th Conference on Security Standards Research, Darmstadt, Germany, November 26-27, 2018. [posted here 5/14/18]
The purpose of this conference is to discuss the many research problems deriving from studies of existing standards, the development of revisions to existing standards, and the exploration of completely new areas of standardisation. Indeed, many security standards bodies are only beginning to address the issue of transparency, so that the process of selecting security techniques for standardisation can be seen to be as scientific and unbiased as possible. This year, we hope to tap into the current trend, which has seen more standardisation efforts being open to interaction with academics. This follows in the footsteps of IETF’s design approach for TLS 1.3, which has seen substantial academic input. Similarly, several post-quantum efforts have seen interaction between academia and industry. This conference is intended to cover the full spectrum of research on security standardisation, including, but not restricted to, work on cryptographic techniques (including ANSI, IEEE, IETF, ISO/IEC JTC 1/SC 27, ITU-T and NIST), security management, security evaluation criteria, network security, privacy and identity management, smart cards and RFID tags, biometrics, security modules, and industry-specific security standards (e.g. those produced by the payments, telecommunications and computing industries for such things as payment protocols, mobile telephony and trusted computing).

For more information, please see https://ssr2018.net/.

FPS 2018 11th International Symposium on Foundations & Practice of Security, Montreal, Canada, November 13-15, 2018. [posted here 7/30/18]
We invite researchers and practitioners from all countries working in security, privacy, trustworthy data systems and related areas to participate in the event. Protecting the communication and data infrastructure of an increasingly inter-connected world has become vital to the normal functioning of all aspects of our world. Security has emerged as an important scientific discipline whose many multifaceted complexities deserve the attention and synergy of the mathematical, computer science and engineering communities. The aim of FPS is to discuss and exchange theoretical and practical ideas that address security issues in inter-connected systems. It aims to provide scientific presentations as well as to establish links, promote scientific collaboration, joint research programs, and student exchanges between institutions involved in this important and fast moving research field. We also invite papers from researchers and practitioners working in security, privacy, trustworthy data systems and related areas to submit their original papers.

For more information, please see http://fps2018.encs.concordia.ca/call-for-papers/.

ICICS 2018 20th International Conference on Information and Communications Security, Lille, France, October 29-31, 2018. [posted here 4/23/18]
The conference started in 1997 and aims at bringing together leading researchers and practitioners from both academia and industry to discuss and exchange their experiences, lessons learned, and insights related to computer and communications security. Original papers offering novel research contributions on all aspects of information and communications security are solicited for submission to ICICS 2018. Topics of interest include, but are not limited to:
- Access control
- Anonymity
- Applied cryptography
- Authentication and authorization
- Biometrics security
- Blockchain and digital currency security
- Cloud security
- Computer and digital forensics
- Cyber-Physical Systems security
- Data and system integrity
- Database security
- Distributed systems security
- E-Commerce security and trust issues
- Embedded systems security
- Engineering issues of cryptographic protocols and security systems
- Fraud and cyber-crime
- Hardware security
- Identity access management
- Industrial Control Systems security
- Information hiding and watermarking
- Insider threat detection
- Intellectual property protection
- Intrusion detection
- IoT security and privacy
- Key management and key recovery
- Language-based security
- Malware and Anti-malware
- Mobile computing security and privacy
- Network security
- Network Functions Virtualization security
- Operating systems security
- Post-snowden cryptography
- Privacy protection
- Privacy-preserving data mining
- Risk assessment
- Social networks security, privacy and trust
- Software Defined Networking security
- Security management
- Security models, metrics, and policies
- Security and privacy of Big Data
- Security of Critical Infrastructures
- Trust and reputation systems
- Trusted computing and trustworthy computing technologies
- Usable security and privacy
- Underground economy
- Verification of security protocols
- Web security
- Wireless security

For more information, please see http://conference.imt-lille-douai.fr/icics2018/.

CRiSIS 2018 13th International Conference on Risks and Security of Internet and Systems, Arcachon, France, October 16-18, 2018. [posted here 5/28/18]
The International Conference on Risks and Security of Internet and Systems 2018 will be the 13th in a series dedicated to security issues in Internet-related applications, networks and systems. Internet has become essential for the exchange of information between user groups and organizations from different backgrounds and with different needs and objectives. These users are exposed to increasing risks regarding security and privacy, due to the development of more and more sophisticated online attacks, the growth of Cyber Crime, etc. Attackers nowadays do not lack motivation and they are more and more experienced. To make matters worse, for performing attacks have become easily accessible. Moreover, the increasing complexity as well as the immaturity of new technologies such as pervasive, mobile and wireless devices and networks, raise new security challenges. In this context, new security mechanisms and techniques should be deployed to achieve an assurance level acceptable for critical domains such as energy, transportation, health, defence, banking, critical infrastructures, embedded systems and networks, avionics systems, etc. The CRiSIS conference offers a remarkable forum for computer and network security actors from industry, academia and government to meet, exchange ideas and present recent advances on Internet-related security threats and vulnerabilities, and on the solutions that are needed to counter them. The topics addressed by CRiSIS range from the analysis of risks, attacks to networks and system survivability, to security models, security mechanisms and privacy enhancing technologies. The authors are invited to submit research results as well as practical experiment or deployment reports. Industrial papers about applications or case studies are also welcomed in different domains (e.g., telemedicine, banking, e-government, e-learning, e-commerce, critical infrastructures, mobile networks, embedded applications, etc.).

For more information, please see http://crisis2018.labri.fr.

WPES 2018 Workshop on Privacy in the Electronic Society, Held in conjunction with ACM CCS 2018, Toronto, Canada, October 15, 2018. [posted here 6/18/18]
The Information Revolution has thoroughly transformed society. One of the major implications of this technological shift has been a massive increase in the collection, sharing, and analysis of personal data. The goal of this workshop is to discuss the privacy problems that result as well as their solutions. The workshop seeks submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of electronic privacy, as well as experimental studies of fielded systems. We encourage submissions from other communities such as law and business that present these communities' perspectives on technological issues. Topics of interest include:
- bias and fairness in machine learning - blockchain and cryptocurrency privacy - communication privacy - economics of privacy - human rights and privacy - Internet of Things privacy - location privacy - machine-learning privacy - medical privacy - mobile-device privacy - private data analysis - privacy-enhancing technologies - privacy policies - privacy threats - social-network privacy - usable privacy technologies - Web privacy

For more information, please see https://wpes.tech/.

ACM-CCS 2018 25th ACM Conference on Computer and Communications Security, Toronto, Canada, October 15-19, 2018. [posted here 2/5/18]
The 25th ACM Conference on Computer and Communications Security (ACM CCS) seeks submissions presenting scientific innovations in all practical and theoretical aspects of computer and communications security and privacy. Papers should demonstrate their real-world impacts. Theoretic papers are expected to make a convincing case for the relevance of their techniques and findings to secure systems.

For more information, please see https://www.sigsac.org/ccs/CCS2018/papers.html.

BigTrust 2018 2nd International Workshop on Trust, Security and Privacy for Big Data, Chengdu, China, October 9-12, 2018. [posted here 6/18/18]
Big Data has the potential for enabling new insights to change science, engineering, medicine, healthcare, finance, business, and ultimately society itself. Current work on Big Data focuses on information processing such as data mining and analysis. However, trust, security and privacy of Big Data are vital concerns that have received less research focus. Regarding the above context, this workshop proposal is aimed at bringing together people from both academia and industry to present their most recent work related to trust, security and privacy issues in Big Data, and exchange ideas and thoughts in order to identify emerging research topics and define the future of Big Data. BigTrust 2018 is a part of MASS 2018, the 15th IEEE International Conference on Mobile Ad-hoc and Sensor Systems.

For more information, please see http://res.hnu.edu.cn/hbs/Bigtrust2018/.

CANS 2018 17th International Conference on Cryptology and Network Security, Naples, Italy, September 30 - October 3, 2018. [posted here 2/5/18]
The annual International Conference on Cryptology and Network Security (CANS) focuses on current advances in all aspects of cryptology, data protection, and network and computer security. CANS 2018 is held in cooperation with the International Association of Cryptologic Research (IACR). High quality papers on unpublished research and implementation experiences are solicited for submission.

For more information, please see http://cans2018.na.icar.cnr.it/.

SecDev 2018 IEEE Security Development Conference, Cambridge, MA, USA, September 30 - October 2, 2018. [posted here 1/1/18]
SecDev is a venue for presenting ideas, research, and experience about how to develop secure systems. SecDev is distinguished by its focus on the theory, techniques, and tools for how to "build security in" to computing systems, and not simply discover the absence of security. Its goal is to encourage and disseminate ideas for secure system development among academia, industry, and government. Developers have valuable experiences and ideas that can inform academic research, and researchers have concepts, studies, and even code and tools that could benefit developers. Great SecDev contributions could come from attendees of industrial conferences like AppSec, RSA, Black Hat, and Shmoocon; from attendees of academic conferences like IEEE S&P, IEEE CSF, USENIX Security, PLDI, FSE, ISSTA, SOUPS, and others; and from newcomers. SecDev solicits four types of contributions. First, SecDev is a forum for novel research papers that present innovations, experience-based insights, or a vision about how to "build security in" to existing and new computing systems. Position papers with exceptional visions will also be considered. Second, SecDev seeks Best Practices (BP) papers that provide an in-depth clarification and integration of solutions on a major security area. The paper needs to provide new perspectives and insights, although it could draw upon prior work. Third, SecDev seeks hands-on and interactive tutorials on processes, frameworks, languages, and tools for building security in. The goal is to share knowledge on the art and science of secure systems development. Fourth, SecDev seeks abstracts from practitioners to share their practical experiences and challenges in security development.

For more information, please see https://secdev.ieee.org/2018/papers/.

NISK 2018 11th Norwegian Information Security Conference, Longyearbyen, Svalbard, Norway, September 18-20, 2018. [posted here 2/26/18]
The 11th Norwegian Information Security Conference (NISK2018) will take place in Svalbard, Sep. 18-20, 2018. The annual NISK conference series aims to be the principal Norwegian venue for presenting new research and developments in the field of ICT security and privacy, and bringing together people from universities, industry, and public authorities. We invite national and international contributions in any aspect of ICT security and privacy. Submissions can be in the form of full papers, short papers and poster/demo presentation. All papers must be original and not simultaneously submitted to another journal or conference.

For more information, please see https://easychair.org/cfp/NISK2018.

STRIVE 2018 1st Workshop on Safety, securiTy, and pRivacy In automotiVe systEms, Co-located with SAFECOMP 2018, Vasteras, Sweden, September 18, 2018. [posted here 3/19/18]
The introduction of ICT systems into vehicles make them more prone to cyber-security attacks. Such attacks may impact on vehicles capability and, consequently, on the safety of drivers, passengers. The strong integration among dedicated ICT devices, the physical environment, and the networking infrastructure, leads to consider modern vehicles as Cyber-Physical Systems (CPS). This workshop aims at providing a forum for researchers and engineers in academia and industry to foster an exchange of research results, experiences, and products in the automotive domain from both a theoretical and practical perspective. Its ultimate goal is to envision new trends and ideas about aspects of designing, implementing, and evaluating innovative solutions for CPS with a particular focus on the new generation of vehicles. Indeed, the automotive domain presents several challenges in the fields of vehicular network, Internet of Things, Privacy, as well as Safety and Security methods and approaches. The workshop aims at presenting the advancement on the state of art in these fields and spreading their adoption in several scenarios involving main stockholders of the automotive domain.

For more information, please see http://www.iit.cnr.it/strive2018.

PLLS 2018 2nd Workshop on the Protection of Long-Lived Systems, Parnu, Estonia, September 17-19, 2018. [posted here 2/19/18]
Original contributions on technical, legal, social and economical aspects of protecting systems that are intended to work or have been working during a long period of time are solicited for submission to PLLS 2018. Submissions are welcome on any topics related to long-term security.

For more information, please see http://plls2018.ttu.ee.

ICDF2C 2018 10th EAI International Conference on Digital Forensics & Cyber Crime, New Orleans, LA, USA, September 10-12, 2018. [posted here 1/29/18]
Cyberspace is becoming increasingly central to the basic function of modern society. Cybercrime and cyberwarfare have emerged as major threats to the integrity of digital information and to the functioning of cyber-controlled physical systems. Such threats have direct consequences for almost all individuals, businesses and organizations, government institutions, and civic processes. Digital forensics and cybercrime investigations are multidisciplinary areas that encompass law and law enforcement, computer science and engineering, IT operations, economics and finance, data analytics and criminal justice. ICDF2C brings together researchers and practitioners from all these areas in order to scientifically address the numerous challenges due to the rapid increase in the amount and variety of data under investigation, as well as the growing complexity of both the threats and the targeted systems.

For more information, please see http://d-forensics.org/.

STM 2018 14th International Workshop on Security and Trust Management, Co-located with the 23rd European Symposium On Research in Computer Security (ESORICS 2018), Barcelona, Spain, September 6-7, 2018. [posted here 5/28/18]
STM (Security and Trust Management) is a working group of ERCIM (European Research Consortium in Informatics and Mathematics). STM 2018 is the fourteenth workshop in this series and will be held in Barcelona, Spain, in conjunction with the 23rd European Symposium On Research in Computer Security (ESORICS 2018). The workshop seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in ICTs.

For more information, please see https://www.nics.uma.es/pub/stm18.

IWSEC 2018 13th International Workshop on Security, Sendai, Japan, September 3-5, 2018. [posted here 2/19/18]
Original papers on the research and development of various security topics, as well as case studies and implementation experiences, are solicited for submission to IWSEC 2018. Topics of interest for IWSEC 2018 include all theory and practice of cryptography, information security, and network security, as in previous IWSEC workshops.

For more information, please see http://www.iwsec.org/2018/.

NSPW 2018 New Security Paradigms Workshop, Cumberland Lodge, Windsor, UK, August 28-31, 2018. [posted here 3/12/18]
The New Security Paradigms Workshop (NSPW) seeks embryonic, disruptive, and unconventional ideas on information and cyber security that benefit from early feedback. Submissions typically address current limitations of information security, directly challenge long-held beliefs or the very foundations of security, or discuss problems from an entirely novel angle, leading to new solutions. We welcome papers both from computer science and other disciplines that study adversarial relationships, as well as from practice. The workshop is invitation-only; all accepted papers receive a 1 hour plenary time slot for presentation and discussion. In order to maximize diversity of perspectives, we particularly encourage submissions from new NSPW authors, from Ph.D. students, and from non-obvious disciplines and institutions. In 2018, NSPW invites theme submissions around "Security in 2038" next to regular submissions. We know from past experience that every security advance brings with it new security failures. Automated software updates open the door to malicious software updates; DNSSEC is subject to cryptography-based denial-of-service attacks; antivirus software can be compromised by data files that are otherwise harmless. We encourage authors to imagine the security problems of the next 20 years, how they are currently being created through fallible solutions and paradigms, and what alternative paradigms would be available to mitigate those anomalies (as meant by Kuhn). Theme submissions can take any form, but we suggest writing them as if they were a submission for NSPW 2038 (including citations to future work). We particularly invite submissions (co-)authored by historians and futurologists.

For more information, please see http://nspw.org/2018/cfp.

WCTI 2018 International Workshop on Cyber Threat Intelligence, Held in conjunction with the 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, Germany, August 27-30, 2018. [posted here 2/19/18]
In order to effectively defend a system against malicious activities, information about the nature of the adversaries, their available skills and resources is essential. Without this information, we run the risk that the portfolio of countermeasures does not turn out to be adequate to thwart off cyber threats, or that the defender deploys unnecessary resources. Cyber Threat Intelligence is an emerging new discipline, which aims to develop methods and techniques to assemble information about compromises, extract information about the infrastructure and tools used, investigate adversarial techniques and practices and their evolution, structure and share this information and thus help detect and prevent future incidents. WCTI aims to bring together experts from academia, industry, government and law enforcement who are interested to advance the state of the art in cyber threat intelligence. The aim of the workshop is to present mature and early stage ideas, promote discussion and exchange, and build a community of researchers and practitioners in cyber threat intelligence.

For more information, please see https://www.ares-conference.eu/workshops/wcti-2018/.

FARES 2018 13th International Workshop on Frontiers in Availability, Reliability and Security, Hamburg, Germany, August 27-30, 2018. [posted here 2/5/18]
FARES establishes an in-depth academic platform to exchange novel theories, designs, applications and on-going research results among researchers and practitioners in different Computing Dependability aspects which emphasize the Practical Issues in Availability, Reliability and Security. Topics of interest comprise but are not limited to:
- Reliability Models and Failure Prevention
- Standards, Guidelines and Certification
- Dependability Requirement Engineering
- Intrusion Detection and Fraud Detection
- Database and Datawarehouse Security
- Dependability Modelling and Prediction
- Secure Enterprise Information System
- Trust Models and Trust Management
- Network/Software/Database Security
- Risk Planning, Analysis & Awareness
- Survivability of Computing Systems
- Authorization and Authentication
- Applied Tools and Applications
- Security and privacy issues
- Security Models / Methods
- Availability and Reliability
- Usability and Security
- Digital Forensics
- Grid Security

For more information, please see https://www.ares-conference.eu/workshops/fares-2018/.

ARES 2018 13th International Conference on Availability, Reliability and Security, Hamburg, Germany, August 27-30, 2018. [posted here 12/25/17]
The 13th International Conference on Availability, Reliability and Security ("ARES - The International Dependability Conference") will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of dependability - with special focus on the crucial linkage between availability, reliability and security. ARES aims at a full and detailed discussion of the research issues of dependability as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications. ARES will emphasize the interplay between foundations and practical issues of dependability in emerging areas such as e-government, m-government, location-based applications, ubiquitous computing, autonomous computing, chances of grid computing etc. ARES is devoted to the critical examination and research challenges of the various aspects of Dependable Computing and the definition of a future road map.

For more information, please see http://www.ares-conference.eu.

Crypto 2018 38th International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018. [posted here 12/11/17]
Original contributions on all technical aspects of cryptology are solicited for submission to Crypto 2018, the 38th Annual International Cryptology Conference. Submissions are welcome on any cryptographic topic including, but not limited to:
- Foundational theory and mathematics
- The design, proposal, and analysis of cryptographic primitives and protocols
- Secure implementation and optimization in hardware or software; and
- Applied aspects of cryptography

For more information, please see https://crypto.iacr.org/2018/.

USENIX Security 2018 27th USENIX Security Symposium, Baltimore, MD, USA, August 15-17, 2018. [posted here 11/27/17]
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. All researchers are encouraged to submit papers covering novel and scientifically significant practical works in computer security. USENIX Security is interested in all aspects of computing systems security and privacy. Papers without a clear application to security or privacy, however, will be considered out of scope and may be rejected without full review.

For more information, please see https://www.usenix.org/conference/usenixsecurity18.

DASC 2018 16th IEEE International Conference on Dependable, Autonomic and Secure Computing, Athens, Greece, August 12-15, 2018. [posted here 12/25/17]
IEEE DASC 2018 aims to bring together computer scientists, industrial engineers, and researchers to discuss and exchange experimental and theoretical results, novel designs, work-in-progress, experience, case studies, and trend-setting ideas in the areas of dependability, security, trust and/or autonomic computing systems. Topics of particular interests include the following tracks, but are not limited to:
- Dependable, Autonomic, Secure Computing Systems, Architectures and Communications
- Cloud Computing and Fog/edge Computing with Autonomic and Trusted Environment
- Dependable Automatic Control Techniques and Systems
- Dependable Sensors, Devices, Embedded Systems
- Dependable Electronic-Mechanical Systems, Optic-Electronic Systems
- Self-improvement in Dependable Systems
- Self-healing, Self-protection and Fault-tolerant Systems
- Hardware and Software Reliability, Verification and Testing
- Software Engineering for Dependable Systems
- Safety-critical Systems in Transportation and Power System
- Security Models and Quantifications
- Trusted P2P, Web Service, SoA, SaaS, EaaS, and PaaS
- Self-protection and Intrusion-detection in Security
- DRM, Watermarking Technology, IP Protection
- Context-aware Access Control
- Virus Detections and Anti-Virus Techniques/Software
- Cyber Attack, Crime and Cyber War
- Human Interaction with Trusted and Autonomic Computing Systems
- Security, Dependability and Autonomic Issues in Ubiquitous Computing
- Security, Dependability and Autonomic Issues in Cyber-Physical System
- Security, Dependability and Autonomic Issues in Big Data, SDN, and IoT Systems
- QoS in Communications and Services and Service Oriented Architectures
- Information and System Security
- Reliable Computing and Trusted Computing
- Wireless Emergency and Security Systems
- Information Technology in Biomedicine
- Multimedia Security Issues over Mobile and Wireless Networks
- Multimedia in Mobile Computing: Issues, System Design and Performance Evaluation
- Software Architectures and Design for Emerging Systems
- Software Engineering for Emerging Networks, Systems, and Mobile Systems
- Evaluation Platforms for Dependable, Autonomic and Secure Computing Systems
- Trustworthy Data, Secured Data Collection System, Model, and Architectures

For more information, please see http://cyber-science.org/2018/dasc/.

SciSec 2018 1st International Conference on Science of Cyber Security, Beijing, China, August 12-14, 2018. [posted here 12/4/17]
This new forum aims to catalyze the research collaborations between the relevant communities and disciplines that can work together to deepen our understanding of, and build a firm foundation for, the emerging Science of Cyber Security. Publications in this venue would distinguish themselves from others by taking or thinking from a holistic perspective about cyber security, rather than the building-block perspective. Each submission will be reviewed (double blind) by at least 3 reviewers. The program committee plans to select and award a Best Paper and a Best Student Paper. The post-conference proceedings will be published in Springer's Lecture Notes in Computer Science (LNCS) series. Areas of interest include:
- Cybersecurity Dynamics
- Cybersecurity Metrics and Their Measurements
- First-principle Cybersecurity Modeling and Analysis (e.g., Dynamical Systems, Control-Theoretic, and Game-Theoretic Modeling)
- Cybersecurity Data Analytics
- Big Data for Cybersecurity
- Artificial Intelligence for Cybersecurity
- Machine Learning for Cybersecurity
- Economics Approaches for Cybersecurity
- Social Sciences Approaches for Cybersecurity
- Statistical Physics Approaches for Cybersecurity
- Complexity Sciences Approaches for Cybersecurity
- Experimental Cybersecurity
- Macroscopic Cybersecurity
- Statistics Approaches for Cybersecurity
- Human Factors for Cybersecurity
- Compositional Security
- Biology-inspired Approaches for Cybersecurity

For more information, please see http://www.sci-cs.net/.

SOUPS 2018 14th Symposium on Usable Privacy and Security, Baltimore, MD, USA, August 12-14, 2018. [posted here 12/11/17]
The Fourteenth Symposium on Usable Privacy and Security will bring together an interdisciplinary group of researchers and practitioners in human computer interaction, security, and privacy. We invite authors to submit previously unpublished papers describing research or experience in all areas of usable privacy and security. We welcome a variety of research methods, including both qualitative and quantitative approaches. Papers will be judged on their scientific quality, overall quality, and value to the community.

For more information, please see https://www.usenix.org/conference/soups2018.

PETS 2018 18th Privacy Enhancing Technologies Symposium, Barcelona, Spain, July 24-27, 2018. [posted here 08/07/17]
The annual Privacy Enhancing Technologies Symposium (PETS) brings together privacy experts from around the world to present and discuss recent advances and new perspectives on research in privacy technologies. Papers undergo a journal-style reviewing process and accepted papers are published in Proceedings on Privacy Enhancing Technologies (PoPETs), a scholarly, open access journal. Submitted papers should present novel practical and/or theoretical research into the design, analysis, experimentation, or fielding of privacy-enhancing technologies. While PETS/PoPETs has traditionally been home to research on anonymity systems and privacy-oriented cryptography, we strongly encourage submissions on a number of both well-established and emerging privacy-related topics, for which examples are provided below. PoPETs also solicits submissions for Systematization of Knowledge (SoK) papers. These are papers that critically review, evaluate, and contextualize work in areas for which a body of prior literature exists, and whose contribution lies in systematizing the existing knowledge in that area. Authors are encouraged to view our FAQ about the submission process.
- Behavioural targeting
- Building and deploying privacy-enhancing systems
- Crowdsourcing for privacy
- Cryptographic tools for privacy
- Data protection technologies
- Differential privacy
- Economics of privacy and game-theoretical approaches to privacy
- Empirical studies of privacy in real-world systems
- Forensics and privacy
- Human factors, usability and user-centered design for PETs
- Information leakage, data correlation and generic attacks to privacy
- Interdisciplinary research connecting privacy to economics, law, ethnography, psychology, medicine, biotechnology
- Location and mobility privacy
- Machine learning and privacy
- Measuring and quantifying privacy
- Mobile devices and privacy
- Obfuscation-based privacy
- Policy languages and tools for privacy
- Privacy in cloud and big-data applications
- Privacy in social networks and microblogging systems
- Privacy-enhanced access control, authentication, and identity management
- Profiling and data mining
- Reliability, robustness, and abuse prevention in privacy systems
- Surveillance
- Systems for anonymous communications and censorship resistance
- Traffic analysis
- Transparency enhancing tools
- Web privacy

For more information, please see https://petsymposium.org/.

DBSec 2018 32nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Bergamo, Italy, July 16-18, 2018. [posted here 1/22/18]
DBSec is an annual international conference covering research in data and applications security and privacy. The 32nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2018) will be held in Bergamo, Italy. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, and applications security. Topics of interest include, but are not limited to:
- access control
- anonymity
- applied cryptography in data security
- authentication
- big data security
- data and system integrity
- data protection
- database security
- digital rights management
- identity management
- intrusion detection
- knowledge discovery and privacy
- methodologies for data and application security
- network security
- organizational security
- privacy
- secure cloud computing
- secure distributed systems
- secure information integration
- secure Web services
- security and privacy in crowdsourcing
- security and privacy in IT outsourcing
- security and privacy in the Internet of Things
- security and privacy in location-based services
- security and privacy in P2P scenarios and social networks
- security and privacy in pervasive/ubiquitous computing
- security and privacy policies
- security management
- security metrics
- threats, vulnerabilities, and risk management
- trust and reputation systems
- trust management
- wireless and mobile security

For more information, please see http://dbsec18.unibg.it.

DFRWS 2018 18th Annual DFRWS USA 2018 Conference, Providence, Rhode Island, USA, July 15-18, 2018. [posted here 11/13/17]
We invite contributions in five categories: research papers, presentation proposals, panel proposals, workshop proposals, and demo proposals. Topics of Interest:
- Memory analysis and snapshot acquisition
- Storage forensics, including solid state
- "Big data" forensics, related to collection, analysis, and visualization
- Incident response and live analysis
- Forensics of cloud and virtualized environments
- Malware and targeted attacks (analysis and attribution)
- Network and distributed system forensics
- Event reconstruction methods and tools
- Mobile and embedded device forensics
- Digital evidence storage and preservation
- Data recovery and reconstruction
- Multimedia analysis
- Database forensics
- Tool testing and development
- Digital evidence and the law
- Case studies and trend reports
- Data hiding and discovery
- Anti-forensics and anti-anti-forensics
- Interpersonal communications and social network analysis
- Non-traditional forensic scenarios and approaches (e.g. vehicles, Internet of Things, industrial control systems, and SCADA)
- Archival preservation & reconstruction

For more information, please see http://dfrws.org/conferences/dfrws-usa-2018.

WCCI-Blockchain 2018 Blockchain Research and Applications Session, Held in conjunction with the 2018 World Congress on Computational Intelligence (WCCI 2018), Rio de Janeiro, Brasil, July 8-13, 2018. [posted here 1/29/18]
The blockchain emerged as a novel distributed consensus scheme that allows transactions, and any other data, to be securely stored and verified in a decentralized way. Considered by some as revolutionary as the Internet, the blockchain has the potential to underpin concepts, frameworks, regulations, and economics. The nascent field of blockchain research is highly interdisciplinary, and has the potential for fascinating research projects and results, sitting at the intersection of computer science, cryptography, economics, engineering, finance, law, mathematics, and politics. Many technical challenges arise with the rapid development of distributed ledger technologies. There is a great interest in applying blockchain to different application scenarios and in solving complex problems. This technology also offers superb opportunities to support the transformation of business models. This special session aims to provide a forum for researchers in this area to carefully analyze current systems or propose new ones, in order to create a scientific background for a solid development of new blockchain technology systems.

For more information, please see http://www.ieee-cifer.org.

GRAMSEC 2018 5th International Workshop on Graphical Models for Security, Co-located with CSF 2018, Oxford, UK, July 8, 2018. (Submission Due 15 April 2018) [posted here 3/5/18]
The use of graphical security models to represent and analyse the security of systems has gained an increasing research attention over the last two decades. Formal methods and computer security researchers, as well as security professionals from the industry and government, have proposed various graphical security models, metrics, and measurements. Graphical models are used to capture different security facets and address a range of challenges including security assessment, automated defence, secure services composition, security policy validation, and verification. For example, attack graphs, attack trees, attack-defence trees, and attack countermeasure trees represent possible ways of attacking and defending a system while misuse cases and mal-activity diagrams capture threats and abusive behaviour of users.

For more information, please see http://gramsec.uni.lu.

IVSW 2018 3rd International Verification and Security Workshop, Costa Brava, Spain, July 2-4, 2018. [posted here 1/8/18]
Issues related to verification and security are increasingly important in modern electronic systems. In particular, the huge complexity of electronic systems has led to growth in quality, reliability and security needs in several application domains as well as pressure for low cost products. There is a corresponding increasing demand for cost-effective verification techniques and security solutions. These needs have increased dramatically with the increased complexity of electronic systems and the fast adoption of these systems in all aspects of our daily lives. The goal of IVSW is to bring industry practitioners and researchers from the fields of verification, validation, test, reliability and security to exchange innovative ideas and to develop new methodologies for solving the difficult challenges facing us today in various SoC design environments. The workshop seeks submissions from academia and industry presenting novel research results on the following topics of interest:
- Verification challenges of IoT
- High-level test generation for functional verification
- Emulation techniques and FPGA prototyping
- Triage and debug methodologies
- Silicon debugging
- Low-power verification
- Formal techniques and their applications
- Verification coverage
- Performance validation and characterization
- Design for Verifiability (DFV)
- Memory and coherency verification
- ESL design and Virtual Platforms
- Design for security and security validation
- CAD metrics and tools for security
- Cryptography and trusted computing
- Detection of Trojans and counterfeit electronics
- Methods for IP protection (obfuscation, encryption, etc.)
- Fault-based side-channel attacks and countermeasures
- Hardware security primitives design and evaluation
- Security for analog/mixed signal (AMS) circuits
- Security in automotive, railway, avionics, space, Internet of Things (IoT)
- Data analytics in verification and security
- Cross layer security and verification
- Security of design environment and tools, and supply chain

For more information, please see http://tima.imag.fr/conferences/ivsw/ivsw18/.

ESSoS 2018 International Symposium on Engineering Secure Software and Systems, Campus Paris-Saclay, France, June 26-27, 2018. (Submission Due 9 March 2018) [posted here 12/11/17]
Software-based systems permeate the very fabric of our society from enterprise IT systems and mobile devices to smart home and city environments. Consequently, computer security is becoming an increasingly inter-disciplinary subject requiring attention to the various aspects of securing our software-based infrastructure. One must pay careful attention to ensure compatibility with existing software and the wider socio-technical context (e.g., users and organisations) which it inhabits. This, in turn, requires an approach that integrates insights from computer security research with rigorous software engineering methods to ensure the security and resilience of our digital infrastructure. ESSoS therefore welcomes contributions that are at the border of system security and software engineering. The goal of this symposium is to bring together researchers and practitioners to advance the state of the art and practice in secure software engineering. Being one of the few conference-level events dedicated to this topic, it explicitly aims to bridge the software engineering and software security communities. The symposium features two days of technical program including two keynote presentations. In addition to academic papers, the symposium encourages submission of high-quality, informative industrial experience papers about successes and failures in secure software engineering and the lessons learned. Furthermore, the symposium also accepts short idea papers that crisply describe a promising direction, approach, or insight.

For more information, please see https://distrinet.cs.kuleuven.be/events/essos/2018/index.html.

DSML 2018 International Workshop on Dependable and Secure Machine Learning, Co-located with the 48th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2018), Luxembourg City, Luxembourg, June 25, 2018. [posted here 3/12/18]
The DSN Workshop on Dependable and Secure Machine Learning (DSML) is an open forum for researchers, practitioners, and regulatory experts, to present and discuss innovative ideas and practical techniques and tools for producing dependable and secure machine learning (ML) systems. A major goal of the workshop is to draw the attention of the research community to the problem of establishing guarantees of reliability, security, safety, and robustness for systems that incorporate increasingly complex ML models, and to the challenge of determining whether such systems can comply with requirements for safety-critical systems. A further goal is to build a research community at the intersection of machine learning and dependable and secure computing.

For more information, please see https://dependablesecureml.github.io.

ASIACCS 2018 ACM Symposium on Information, Computer and Communications Security, Sungdo, Incheon, Korea, June 4-8, 2018. [posted here 11/06/17]
We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of computer and network security. Areas of interest for ASIACCS 2018 include, but are not limited to:
- Access control
- Accounting and audit
- Applied cryptography
- Authentication
- Big data security and privacy
- Biometrics
- Blockchain and alternatives
- Cloud computing security
- Computer forensics
- Cyber-physical system security
- Data and application security
- Embedded systems security
- Formal methods for security
- Hardware-based security and applications
- IoT security and privacy
- Key management
- Malware and botnets
- Mobile computing security
- Network security
- Operating system security
- Practical post-quantum security
- Privacy-enhancing technology
- Runtime attacks and defenses
- Secure computation
- Security architectures
- Security of critical infrastructures
- Security metrics
- Software security
- Threat modeling
- Trusted computing
- Usable security and privacy
- Web security
- Wireless security and privacy

For more information, please see http://asiaccs2018.org/.

WIIoTS 2018 Workshop on Industrial Internet of Things Security, Bilbao, Spain, June 4-7, 2018. [posted here 12/25/17]
The Industrial Internet of Things (IIoT) is an emerging paradigm in today's (control) industry, comprising Internet-enabled cyber-physical devices with the ability to couple to the new interconnection technologies such as cloud/fog computing. Under this perspective, the new industrial cyber-physical "things" can be accessible and available from remote locations, the information of which can be processed and stored in distributed locations, favouring the cooperation, the performance in field, and the achievement of operational tasks working at optimal times. However, the incorporation of the IIoT in the new scenarios of the fourth industrial revolution, also known as Industry 4.0, entails having to consider the new security and privacy issues that can threaten the wellbeing of the new IIoT ecosystem and its coexistence with the existing industrial technologies, with a high risk of impact on the end-users. Therefore, this workshop will create a collaboration platform for experts from academia, governments and industry to address the new IIoT security and privacy challenges. Papers related to security and privacy of embedded systems working in industrial and control environments, such as SCADA, smart grid, smart cities, manufacturing systems, water systems, and in critical infrastructures in general, are all welcome at WIIoTS 2018.

For more information, please see http://globaliotsummit.org.

CNS 2018 IEEE Conference on Communications and Network Security, Beijing, China, May 30 - June 1, 2018. [posted here 10/30/17]
IEEE Conference on Communications and Network Security (IEEE CNS) is a conference series in IEEE Communications Society (ComSoc) core conference portfolio and the only ComSoc conference focusing solely on cybersecurity. IEEE CNS provides a premier forum for security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise awareness, and share experience related to all practical and theoretical aspects of cybersecurity. Building on the success of the past five years' conferences, IEEE CNS 2018 seeks original high-quality technical papers from academia, government, and industry. Topics of interest encompass all practical and theoretical aspects of communications and network security, from the physical layer to the network layer to the variety of applications reliant on a secure communication substrate. Topics of interest include:
- Anonymity and privacy technologies
- Computer and network forensics
- Cyber deterrence strategies
- Game-theoretic security technologies
- Implementation and evaluation of networked security systems
- Information-theoretic security
- Intrusion detection, prevention, and response
- Key management, public key infrastructures, certification, revocation, and authentication
- Malware detection and mitigation
- Security metrics and models
- Physical-layer and cross-layer security technologies
- Security and privacy for big data
- Security and privacy for data and network outsourcing services
- Security and privacy for mobile and wearable devices
- Security and privacy in cellular networks
- Security and privacy in cloud and edge computing
- Security and privacy in crowdsourcing
- Security and privacy in emerging wireless technologies (dynamic spectrum sharing, cognitive radio networks, millimeter wave communications, MIMO systems, etc.)
- Security and privacy in peer-to-peer and overlay networks
- Security and privacy in Wi-Fi, ad hoc, mesh, sensor, vehicular, body-area, disruption/delay tolerant, and social networks
- Security and privacy in smart cities, smart and connected health, IoT, and RFID systems
- Security for critical infrastructures (smart grids, transportation systems, etc.)
- Security for future Internet architectures and designs
- Security for software-defined and data center networks
- Social, economic, and policy issues of trust, security, and privacy
- Traffic analysis
- Usable security and privacy
- Web, e-commerce, m-commerce, and e-mail security

For more information, please see http://cns2018.ieee-cns.org/.

BioSTAR 2018 3rd International Workshop on Bio-inspired Security, Trust, Assurance and Resilience, Co-located with 39th IEEE Symposium on Security and Privacy (IEEE S&P 2018), San Francisco, CA, USA, May 24, 2018. [posted here 10/23/17]
As computing and communication systems continue to expand and offer new services, these advancements require more dynamic, diverse, and interconnected computing infrastructures. Unfortunately, defending and maintaining resilient and trustworthy operation of these complex systems are increasingly difficult challenges. Conventional approaches to Security, Trust, Assurance and Resilience (STAR for short) are often too narrowly focused and cannot easily scale to manage large, coordinated and persistent attacks in these environments. Designs found in nature are increasingly used as a source of inspiration for STAR and related networking and intelligence solutions for complex computing and communication environments. Nature's footprint is present in the world of Information Technology, where there are an astounding number of computational bio-inspired techniques. These well-regarded approaches include genetic algorithms, neural networks, ant algorithms, immune systems just to name a few. For example several networking management and security technologies have successfully adopted some of nature's approaches, such as swarm intelligence, artificial immune systems, sensor networks, moving target defense, diversity-based software design, etc. Nature has also developed an outstanding ability to recognize individuals or foreign objects and adapt/evolve to protect a group or a single organism. Solutions that incorporate these nature-inspired characteristics often have improved performance and/or provided new capabilities beyond more traditional methods. The aim of this workshop is to bring together the research accomplishments provided by the researchers from academia and the industry. The other goal is to show the latest research results in the field of nature-inspired STAR aspects in computing and communications. Topics of interests include, but are not limited to:
- Nature-inspired anomaly and intrusion detection
- Adaptation algorithms
- Biometrics
- Nature-inspired algorithms and technologies for STAR
- Biomimetics
- Artificial Immune Systems
- Adaptive and Evolvable Systems
- Machine Learning, neural networks, genetic algorithms for STAR
- Nature-inspired analytics and prediction
- Cognitive systems
- Sensor and actuator networks and systems
- Information hiding solutions (steganography, watermarking) for network traffic
- Cooperative defense systems
- Cloud-supported nature-inspired STAR
- Theoretical development in heuristics
- Management of decentralized networks
- Nature-inspired algorithms for dependable networks
- Platforms for STAR services
- Diversity in computing and communications
- Survivable and sustainable systems
- STAR management systems
- Autonomic cyber defenses

For more information, please see http://biostar.cybersecurity.bio/.

SADFE 2018 12th International Workshop on Systematic Approaches to Digital Forensics Engineering, Co-located with 39th IEEE Symposium on Security and Privacy (IEEE S&P 2018), San Francisco, CA, USA, May 24, 2018. [posted here 10/30/17]
SADFE (Systematic Approaches to Digital Forensic Engineering) promotes systematic approaches to digital forensic investigation on failures of todayís cyber systems and networks. SADFE furthers Digital Forensic Engineering (DFE) advancement as a disciplined and holistic scientific practice. The 12th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE) is calling for paper submissions in the broad field of Digital Forensics from both practitioner and researcherís perspectives. With the dynamic change and rapid expansion of the types of electronic devices, networked applications, and investigation challenges, systematic approaches for automating the process of gathering, analyzing and presenting digital evidence are in unprecedented demands. The SADFE conference aims at promoting solutions for related problems. Past speakers and attendees of SADFE have included computer scientists, social scientists, forensic practitioners, lawyers and judges. The synthesis of hard technology and science with social science and practice forms the foundation of this conference. Papers focusing on any of the system, legal, or practical aspects of digital forensics are solicited. Topics to be Addressed:
- Digital Data and Evidence Management: advanced digital evidence discovery, collection, management, storage and preservation
- Digital Evidence, Data Integrity and Analytics: advanced digital evidence and digitized data analysis, correlation, and presentation
- Forensics of embedded or non-traditional devices (e.g. digicams, cell phones, SCADA, obsolete storage media)
- Forensic and digital data integrity issues for digital preservation and recovery
- Scientific Principle-Based Digital Forensic Processes: systematic engineering processes supporting digital evidence management which are sound on scientific, technical and legal grounds
- Legal/technical aspects of admissibility and evidence tests
- Legal, Ethical and Technical Challenges

For more information, please see http://sadfe.org/cfp/.

HST 2018 18th annual IEEE Symposium on Technologies for Homeland Security, Washington D.C., USA, May 2-3, 2018. [posted here 09/11/17]
This symposium brings together innovators from leading academic, industry, businesses, Homeland Security Centers of Excellence, and government agencies to provide a forum to discuss ideas, concepts, and experimental results. Produced by IEEE with technical support from DHS S&T, IEEE, IEEE Boston Section, and IEEE-USA and organizational support from MIT Lincoln Laboratory, Raytheon, and MITRE, this year?s event will once again showcase selected technical papers and posters highlighting emerging technologies to:
- Secure Cyberspace
- Secure Land and Maritime Borders
- Enhance Biometrics & Forensics
- Prevent Terrorism & Manage Incidents

We are currently seeking technical paper and poster session submissions in each of the areas noted above. Papers examining the feasibility of transition to practice will also be considered. This year, papers focused on DHS high-priority technology gaps will be of particular interest.

For more information, please see http://ieee-hst.org.

HOST 2018 IEEE International Symposium on Hardware-Oriented Security and Trust, Washington DC, USA, April 30 - May 4, 2018. [posted here 09/12/17]
IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2018 aims to facilitate the rapid growth of hardware-based security research and development. HOST highlights new results in the area of hardware security. Relevant research topics include architectures, design methods, circuits, and applications of secure hardware. HOST 2018 invites original contributions related to (but not limited to) the following:
- Hardware security primitives (Crypto, PUFs, RNGs)
- Hardware design techniques to facilitate software and/or system security
- Architecture support for security
- Side-channel analysis, attacks, and protection
- Hardware Trojan attacks, detection, and countermeasures
- Hardware security test and verification
- FPGA and system-on-chip (SoC) security
- Supply chain risk mitigation (e.g., counterfeit detection & avoidance)
- Reverse engineering and hardware obfuscation
- Fault injection and mitigation
- Metrics, policies, assessment, and standards related to hardware security
- Hardware IP trust (watermarking, metering, trust verification)
- Trusted manufacturing including split manufacturing and 2.5/3D integration
- Hardware tampering attacks and protection

For more information, please see http://www.hostsymposium.org.

HotSoS 2018 5th Annual Hot Topics in the Science of Security Symposium, Raleigh, North Carolina, USA, April 10-11, 2018. [posted here 10/16/17]
HoTSoS draws together researchers, practitioners, and thought leaders from government, industry, and academia. The conference provides a forum for dialogue centered upon the development and advancement of scientific foundations in cybersecurity. The technical emphasis of HoTSoS is on scientific methods, data gathering and analysis, experimental approaches, mathematical models, and the interactions among those approaches to build a foundational science of security. The HoTSoS vision is one of engaging and growing a communityóincluding researchers and skilled practitioners from diverse disciplinesóthat is focused around the advancement of scientific methods. We invite submissions on any topic related to science of security that aligns with the conference scope and goals listed above. The 2018 HoTSoS will highlight the following themes:
- Scalability and composability in the construction of secure systems
- Policy-governed collaboration for handling data across different domains of authority while ensuring security and privacy
- Security metrics to guide choice-making in security engineering and response
- Resilient architectures that can deliver service despite compromised components
- Analysis of human behavior, including modeling users, operators, and adversaries, to support improved design and analysis
- Foundational research related to privacy that allows for the ability to use (i.e., collect, store, and share) data in accordance with requirements
- Foundations for the security of cyber-physical systems, including applications to the Internet of Things

For more information, please see https://cps-vo.org/group/hotsos/cfp.

PKC 2018 21st IACR International Conference on Practice and Theory in Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-28, 2018. [posted here 07/10/17]
PKC 2018 is the 21st edition of the International Conference on Practice and Theory of Public Key Cryptography, the main annual conference with an explicit focus on public-key cryptography. Original research papers on all aspects of public-key cryptography, covering theory, implementations and applications, are solicited for submission to PKC 2018.

For more information, please see https://pkc.iacr.org/2018/ .

IWSPA 2018 4th International Workshop on Security and Privacy Analytics, Co-located with ACM CODASPY 2018, Tempe, AZ, USA, March 21, 2018. [posted here 10/23/17]
Increasingly, sophisticated techniques from machine learning, data mining, statistics and natural language processing are being applied to challenges in security and privacy fields. However, experts from these areas have no medium where they can meet and exchange ideas so that strong collaborations can emerge, and cross-fertilization of these areas can occur. Moreover, current courses and curricula in security do not sufficiently emphasize background in these areas and students in security and privacy are not emerging with deep knowledge of these topics. Hence, we propose a workshop that will address the research and development efforts in which analytical techniques from machine learning, data mining, natural language processing and statistics are applied to solve security and privacy challenges (ìsecurity analyticsî). Submissions of papers related to methodology, design, techniques and new directions for security and privacy that make significant use of machine learning, data mining, statistics or natural language processing are welcome. Furthermore, submissions on educational topics and systems in the field of security analytics are also highly encouraged.

For more information, please see http://capex.cs.uh.edu/?q=content/4th-international-workshop-security-and-privacy-analytics-2018.

CODASPY 2018 8th ACM Conference on Data and Application Security and Privacy, Tempe, AZ, USA, March 19-21, 2018. [posted here 07/03/17]
CODASPY has had seven successful years and the goal of the conference is to discuss novel, exciting research topics in data and application security and privacy, and to lay out directions for further research and development in this area. The conference seeks submissions from diverse communities, including corporate and academic researchers, open-source projects, standardization bodies, governments, system and security administrators, software engineers and application domain experts. Topics of interest include, but are not limited to:
- Application-layer security policies
- Access control for applications
- Access control for databases
- Data-dissemination controls
- Data forensics
- Enforcement-layer security policies
- Privacy-preserving techniques
- Private information retrieval
- Search on protected/encrypted data
- Secure auditing
- Secure collaboration
- Secure data provenance
- Secure electronic commerce
- Secure information sharing
- Secure knowledge management
- Secure multiparty computation
- Secure software development
- Securing data/apps on untrusted platforms
- Securing the semantic web
- Security and privacy in GIS/spatial data
- Security and privacy in healthcare
- Security and privacy in the Internet of Things
- Security policies for databases
- Social computing security and privacy
- Social networking security and privacy
- Trust metrics for applications, data, and users
- Usable security and privacy
- Web application security

For more information, please see http://www.ycheng.org/codaspy/2018/index.html.

NDSS 2018 Network and Distributed System Security Symposium , February 18-21, 2018, San Diego, CA, USA. [posted here 06/30/17]
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.

For more information, please see https://www.ndss-symposium.org/.

IFIP119-DF 2018 14th Annual IFIP WG 11.9 International Conference on Digital Forensics, New Delhi, India, January 3-5, 2018. [posted here 05/01/17]
The IFIP Working Group 11.9 on Digital Forensics (www.ifip119.org) is an active international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The Fourteenth Annual IFIP WG 11.9 International Conference on Digital Forensics will provide a forum for presenting original, unpublished research results and innovative ideas related to the extraction, analysis and preservation of all forms of electronic evidence. Papers and panel proposals are solicited. All submissions will be refereed by a program committee comprising members of the Working Group. Papers and panel submissions will be selected based on their technical merit and relevance to IFIP WG 11.9. The conference will be limited to approximately a hundred participants to facilitate interactions between researchers and intense discussions of critical research issues. Keynote presentations, revised papers and details of panel discussions will be published as an edited volume - the fourteenth volume in the well-known Advances in Digital Forensics book series (Springer, Heidelberg, Germany) during the summer of 2018. Technical papers and posters are solicited in all areas related to the theory and practice of digital forensics. Areas of special interest include, but are not limited to:
- Theories, techniques and tools for extracting, analyzing and preserving digital evidence
- Network and cloud forensics
- Embedded device forensics
- Digital forensic processes and workflow models
- Digital forensic case studies
- Legal, ethical and policy issues related to digital forensics

For more information, please see http://www.ifip119.org.