Hilarie Orman, Editor | Robert Bruen, Book Review Editor |
Sven Dietrich, Associate Editor | Editor, Reader's Guide |
Conference and Workshop Announcements
Cipher
calls-for-papers
and
calendar
new calls or announcements added since Cipher E55
(the calls-for-papers and the calendar announcements may differ
slightly in content or time of update):
Journal of the Association for Logic Programming, TPLP Special Issue on Specification, Analysis and Verification of Reactive Systems, Editors: Giorgio Delzanno (University of Genova, Italy), Sandro Etalle (University of Twente and CWI Amsterdam, the Netherlands), and Maurizio Gabbrielli (University of Bologna, Italy). (submissions due November 15, 2003)
IEEE Computer special issue on high-speed Internet security, Editors: Simon Shim (San Jose State University), Li Gong (Sun Microsystems), Avi Rubin (The Johns Hopkins University), and Linley Gwennap (the Linley Group). (submissions due January 5, 2004)
Workshop on RFID Privacy and Security, MIT, Cambridge, MA, USA,
November 15, 2003,
IWIA 2004 Second IEEE International Information Assurance Workshop,
Charlotte, NC, USA
April 8-9, 2004, (submissions due October 10, 2003)
PerSec 2004 First IEEE International Workshop on Pervasive Computing
and Communication Security
Orlando, FL, USA,
March 14, 2004, (submissions due October 15, 2003)
WHOLES - A Multiple View of Individual Privacy in a Networked World
Stockholm, Sweden,
January 30-31 2004 (submissions due October 31, 2003)
S&P 2004 IEEE Symposium on Security and Privacy
Oakland, California, USA
May 9-12, 2004. (paper & panel submissions due November 5, 2003;
5-minute talks due March 15, 2004)
ACNS'04 The 2nd conference of Applied Cryptography and Network Security
Yellow Mountain, China,
June 8-11, 2004. (Submission deadline: January 11, 2004)
DIMVA Workshop on Detection of Intrusions and Malware & Vulnerability Assessment,
Dortmund, Germany,
July 6-7, 2004. (Submission deadline: January 31, 2004)
DIMACS 2004 Workshop on Usable Privacy and Security Software
Rutgers University, New Jersey, USA,
July 7-9, 2004. (submissions due April 2, 2004)
Commentary and Opinion
Richard Schroeppel's review of the IACR Crypto conference
Fred Cohen's extended review of the book, Writing Secure Code by Michael Howard and David C. LeBlanc
Robert Bruen's review of the book, Modern Cryptography Theory and Practice by Wenbo Mao
Robert Bruen's review of the book, Real 802.11 Security. Wi-Fi Protected Access and 802.11i by Jon Edney and William Arbaugh
Robert Bruen's review of the book, Halting the Hacker, A Practical Guide to Computer Security by Donald Pipkin
NewsBits:
Announcements and correspondence from readers (please contribute!)
I want to announce the creation of a new mailing list for
announcements concerning NSF's Cyber Trust theme, which plans to have
an announcement on the street in mid-October, with proposals due
probably in mid-January. Though all information is tentative at this
point, we expect to support single and multiple investigator
proposals, as well as some "center-scale" efforts. Naturally, I'll be
needing not only proposals, but panelists to help evaluate them! Those
interested in receiving announcements sent to the list should send an
e-mail (blank subject and contents is fine) to:
join-cyber-trust-announce@lists.nsf.gov
GEOFF BRUMFIEL ... The official said last week that the Homeland
Security Advanced Research Projects Agency — a branch of the
department modelled on the Defense Advanced Research Projects Agency —
will ask for research proposals "within a matter of days". It also
plans to establish its first university-based research centres in
November.
Reader's guide to recent security and privacy literature
(last updated March 15, 2002; new editor needed!)
Listing of academic positions available by
Cynthia Irvine
Staying in touch....
Changing your email address? Please send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TC | TC publications available online | |
TC Publications for sale | Cipher past issues archive | |
IEEE Computer Society | Cipher Privacy Policy |