|
|
Commentary and Opinion
News
Conference and Workshop Announcements
Cipher
calls-for-papers
and
calendar
Cipher calendar announcements are on Twitter; follow "ciphernews"
(the calls-for-papers and the calendar announcements may differ
slightly in content or time of update):
ICDCS-NFSP 2012 1st International Workshop on Network Forensics, Security and Privacy, Held in conjunction with ICDCS 2012, Macau, China, June 18-21, 2012. (Submissions due 29 January 2012)
Cyber space has become an integrated part of human society. At the same time, has also been providing convenient platforms for crimes, such as financial fraud, information phishing, distributed denial of service attacks, and fake message propagation. Especially, the emergence of social networks has introduced significant security and privacy issues to the public. It is a great and new challenge of fighting against criminals in the cyber space. This field involved various disciplines, such as networking, information theory, mathematical modelling, data mining, machine learning, image and voice processing, neural network, pattern recognition, cryptography and forensic criminology. Topics of interest include, but not limited to:
IEEE Network Magazine, Special Issue on Cyber Security of Networked Critical Infrastructures, January 2013, (Submission Due 1 June 2012)
Editors: Saeed Abu-Nimeh (Damballa Inc., USA),
Ernest Foo (Queensland University of Technology Australia, Australia),
Igor Nai Fovino (Global Cyber Security Center, Italy),
Manimaran Govindarasu (Iowa State University, USA),
and Tommy Morris (Mississippi State University, USA)
The daily lives of millions of people depend on processing information
and material through a network of critical infrastructures. Critical
infrastructures
include agriculture and food, water, public health, emergency services,
government,
the defense industrial base, information and telecommunications, energy,
transportation and shipping, banking and finance, chemical industry and
hazardous materials, post, national monuments and icons, and critical
manufacturing. Disruption or disturbance of critical infrastructures
can lead to economical and human losses. Additionally, the control network
of most critical installations is integrated with broader information and
communication systems, including the company business network. Most
maintenance services on process control equipment are performed remotely.
Further, the cyber security of critical infrastructure systems has come
into focus recently as more of these systems are exposed to the Internet.
Therefore, Critical Infrastructure Protection (CIP) has become a topic
of interest for academics, industries, governments, and researchers in
the recent years. A common theme among critical infrastructure is the
dependence upon secure cyber systems for command and control. This
special issue will focus on network aspects that impact the cyber
security of Critical Infrastructure Protection and Resilience. Tutorial
based manuscripts which cover recent advances in one or more of the
topic areas below are requested. Topics may include (but are not
limited to):
WISTP 2012 6th Workshop on Information Security Theory and Practice, London, UK, June 19-22, 2012. (Submissions due 31 January 2012)
Future ICT technologies, like the concepts of Ambient Intelligence and Internet of Things provide a vision of the Information Society where the emphasis is on surrounding people by intelligent interactive interfaces and objects and on environments that are capable of recognising and reacting to the presence of different individuals in a seamless, unobtrusive and invisible manner. WISTP 2012 aims to address the security and privacy issues that are increasingly exposed by mobile and wireless communications and related services, along with evaluating their impact on business, individuals, and the society. The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy of mobile and smart devices, as well as experimental studies of fielded systems based on wireless communication, the application of security technology, the implementation of systems, and lessons learned. We encourage submissions from other communities such as law, business and policy that present these communities' perspectives on technological issues. Topics of interest include, but are not limited to:
DFIS 2012 6th International Symposium on Digital Forensics and Information Security, Vancouver, Canada, June 26-28, 2012. (Submissions due 31 January 2012)
Digital Forensics and Information Security (DFIS) are advanced communication and networking environments where all applications and services are focused on users. In addition, the DFIS has emerged rapidly an exciting new paradigm to provide reliable and comfortable life services. Furthermore, the benefits of DFIS will only be realized if security issues can be appropriately addressed. Specially, forensics for DFIS is very important in the security fields. This workshop is intended to foster state-of-the-art research Digital Forensics and Information Security in the area of DFIS including information and communication technologies, law, social sciences and business administration.
ACNS 2012 10th International Conference on Applied Cryptography and Network Security, Singapore, June 26-29, 2012. (Submissions due 5 February 2012)
The conference seeks submissions from academia, industry, and government presenting novel research on all aspects of applied cryptography as well as network security and privacy. Papers describing novel paradigms, original directions, or non-traditional perspectives are also encouraged. The conference has two tracks: a research track and an industry track. Topics of interest include, but are not limited to:
DSPAN 2012 3rd IEEE Workshop on Data Security and PrivAcy in wireless Networks, Held in conjunction with The Thirteenth International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2012), San Francisco, CA, USA, June 25, 2012. (Submissions due 6 February 2012)
The workshop focuses on defining novel problems and developing novel techniques for data security and privacy issues in wireless and mobile networks. With the emergence of data-intensive wireless networks such as wireless sensor networks and data-centric mobile applications such as location-based services, the traditional boundaries between these three disciplines are blurring. This workshop solicits papers from two main categories: (1) papers that consider the security and privacy of data collection, transmission, storage, publishing,and sharing in wireless networks broadly defined, e.g., MANET,cellular, vehicular, ad hoc, cognitive, as well as sensor networks,and (2) papers that use data analytics techniques to address security and privacy problems in wireless networks. The workshop provides a venue for researchers to present new ideas with impact on three communities wireless networks, databases, and security.
HAISA 2012 6th International Symposium on Human Aspects of Information Security and Assurance, Hersonissos, Crete, Greece, June 6-8, 2012. (Submissions due 13 February 2012)
It is commonly acknowledged that security requirements cannot be addressed by technical means alone, and that a significant aspect of protection comes down to the attitudes, awareness, behaviour and capabilities of the people involved. Indeed, people can potentially represent a key asset in achieving security, but factors such as lack of awareness and understanding, combined with unreasonable demands from security technologies, can dramatically impede their ability to do so. With this in mind, HAISA 2012 specifically addresses information security issues that relate to people. It concerns the methods that inform and guide users' understanding of security, and the technologies that can benefit and support them in achieving protection. HAISA 2012 welcomes papers addressing research and case studies in relation to any aspect of information security that pertains to the attitudes, perceptions and behaviour of people, and how human characteristics or technologies may be positively modified to improve the level of protection. Indicative themes include:
WDFIA 2012 7th International Workshop on Digital Forensics and Incident Analysis, Hersonissos, Crete, Greece, June 6-8, 2012. (Submissions due 13 February 2012)
The field of digital forensics is rapidly evolving and continues to gain significance in both the law enforcement and the scientific community. Being intrinsically interdisciplinary, it draws upon a wide range of subject areas such as information & communication technologies, law, social sciences and business administration. We are pleased to announce the 7th annual workshop on digital forensics and incident analysis graciously hosted at the Creta Maria Convention Centre, Crete, Greece. WDFIA 2012 is supported by IFIP WG 8, and immediately follows the IFIP SEC 2012 international conference at the same venue. The workshop aims to provide a forum for researchers and practitioners to present original, unpublished research results and innovative ideas. We welcome the submission of papers from the full spectrum of issues relating to the theory and practice of digital forensics and incident analysis. Areas of special interest include, but are not limited to:
USENIX-Security 2012 21st USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012. (Submissions due 16 February 2012)
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks. All researchers are encouraged to submit papers covering novel and scientifically significant practical works in computer security. Refereed paper submissions are solicited in all areas relating to systems and network security, including:
WSCS 2012 Workshop on Semantic Computing and Security, Co-located with the IEEE Security and Privacy Symposium 2012, The Westin Hotel, San Francisco, CA, USA, May 24, 2012. (Submissions due 18 February 2012)
This workshop follows the successful September 2011 workshop (WSCSP) at the International Semantic Computing Symposium. This new workshop will explore additional topics and allow semantic computing researchers to have more opportunity to interact with security researchers. Semantic Computing technologies derive and use semantics from content, where "content" is wide-ranging: video, audio, text, conversation, software, devices, actions, behavior, etc. Security technology encompasses the specification of secure behavior as well as the detection of insecure behavior over computer networks. The two disciplines come together in this new and interesting combination, in a synergy-seeking, cutting-edge workshop. The delimited notions of semantics used within Security and Privacy provide a well-defined and as yet unstudied domain for semantic modeling, automated semantic interpretation, and inference, with clear practical uses and opportunities for novel and imaginative research. The workshop on Semantic Computing and Security addresses: (1) deriving semantics from data used for security and privacy research; (2) semantic verification of network activity; and (3) inferring the semantics of malicious free-form data, such as email and web pages. Topics of interest include but are not limited to:
PETS 2012 12th Privacy Enhancing Technologies Symposium, Vigo, Spain, July 11-13, 2012. (Submissions due 20 February 2012)
Privacy and anonymity are increasingly important in the online world. Corporations, governments, and other organizations are realizing and exploiting their power to track users and their behavior. Approaches to protecting individuals, groups, but also companies and governments, from profiling and censorship include decentralization, encryption, distributed trust, and automated policy disclosure. The 12th Privacy Enhancing Technologies Symposium addresses the design and realization of such privacy services for the Internet and other data systems and communication networks by bringing together anonymity and privacy experts from around the world to discuss recent advances and new perspectives. The symposium seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems. We encourage submissions with novel technical contributions from other communities such as law, business, and data protection authorities, that present their perspectives on technological issues. As in the past, the proceedings will be published in the Springer Lecture Notes in Computer Science series, and will be available at the event. Suggested topics include but are not restricted to:
PSOSM 2012 Workshop on Privacy and Security in Online Social Media, Held in conjunction with the 21st International World Wide Web Conference (WWW 2012), Lyon, France, April 16-20, 2012. (Submissions due 20 February 2012)
With increase in usage of the Internet, there has been an exponential increase in the use of online social media on the Internet. Websites like Facebook, YouTube, Orkut, Twitter and Flickr have changed the way Internet is being used. There is a dire need to investigate, study and characterize privacy and security of online social media from various perspectives (computational, cultural, psychological). Real world scalable systems need to be built to detect and defend security and privacy issues on online social media. The main goals of the workshop are: (1) To create a platform to discuss latest issues, trends, and cutting-edge research approaches in security and privacy in online social media; (2) to bring researchers who are working on issues related to security and privacy on the Internet, and those studying online social media, to discuss the problems that overlap and bring these two areas together. Topics / themes include, but not limited to the following:
LEET 2012 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, Co-located with NSDI 2012, San Jose, CA, USA, April 24, 2012. (Submissions due 23 February 2012)
Now in its fifth year, LEET continues to provide a unique forum for the discussion of threats to the confidentiality of our data, the integrity of digital transactions, and the dependability of the technologies we increasingly rely on. We encourage submissions of papers that focus on the malicious activities themselves (e.g., reconnaissance, exploitation, privilege escalation, rootkit installation, attack), our responses as defenders (e.g., prevention, detection, and mitigation), or the social, political, and economic goals driving these malicious activities and the legal and ethical codes guiding our defensive responses. Topics of interest include but are not limited to:
MoST 2012 Mobile Security Technologies Workshop, Co-located with IEEE Symposium on Security and Privacy 2012, The Westin St. Francis Hotel, San Francisco, CA, USA, May 24, 2012. (Submissions due 24 February 2012)
MoST is co-located with the IEEE Security & Privacy Symposium. Mobile Security Technologies (MoST) brings together researchers, practitioners, policy makers, and hardware and software developers of mobile systems to explore the latest understanding and advances in the security and privacy for mobile devices, applications, and systems. We are seeking both short position papers (2-4 pages) and longer papers (a maximum of 10 pages). The scope of MoST 2012 includes, but is not limited to, security and privacy specifically for mobile devices and services related to:
W2SP 2012 Web 2.0 Security & Privacy Workshop, Co-located with IEEE Symposium on Security and Privacy 2012, The Westin St. Francis Hotel, San Francisco, CA, USA, May 24, 2012. (Submissions due 2 March 2012)
W2SP brings together researchers, practitioners, web programmers, policy makers, and others interested in the latest understanding and advances in the security and privacy of the web, browsers and their eco-system. We have had five years of successful W2SP workshops. This year, we will additionally invite selected papers to a special issue of the journal. We are seeking both short position papers (2-4 pages) and longer papers (a maximum of 10 pages). The scope of W2SP 2012 includes, but is not limited to:
CHES 2012 IACR Workshop on Cryptographic Hardware and Embedded Systems, Leuven, Belgium, September 9-12, 2012. (Submissions due 5 March 2012)
CHES covers new results on all aspects of the design and analysis of cryptographic
hardware and software implementations. The workshop builds a bridge between the
cryptographic research community and the cryptographic engineering community.
With participants from industry, academia, and government organizations, the
number of participants has grown to over 300 in recent years. In addition to
a track of high-quality presentations, CHES 2012 will offer invited talks,
tutorials, a poster session, and a rump session. CHES 2012 especially
encourages submissions on the following two subjects: Design Methods to
Build Secure and Efficient Hardware or Software, and Leakage Resilient
Cryptography Including New Model Definitions and Analysis and the Design
of New Cryptosystems. All submitted papers will be reviewed by at least
four Program Committee members. The topics of CHES 2012 include but are
not limited to:
Cryptographic implementations, including
SECRYPT 2012 9th International Conference on Security and Cryptography, Rome, Italy, July 24-27, 2012. (Submissions due 5 March 2012)
SECRYPT is an annual international conference covering research in information and communication security. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography. Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged.
SecIoT 2012 Workshop on the Security of the Internet of Things, Munich, Germany, July 30 - August 2, 2012. (Submissions due 9 March 2012)
While there are many definitions of the Internet of Things (IoT), all of them revolve around the same central concept: a world-wide network of interconnected objects. These objects will make use of multiple technological building blocks (e.g. wireless communication, sensors, actuators, RFID) and connectivity paradigms (e.g. cloud-based infrastructures, P2P systems) in order to allow people and things to be connected anytime anyplace, with anything and anyone. However, mainly due to the inherent heterogeneity of this vision and its broad scope, there will not be a single silver bullet security solution that will fulfill all the security requirements of the IoT. Therefore: How can we include security as a core element of the IoT? How will the IoT interact with other security mechanisms of the Future Internet? What security requirements will be truly challenged by the ultimate vision of the IoT? It is precisely the goal of this workshop to bring together researchers and industry experts in areas relevant to the security of the Internet of Things to discuss these and other significant issues. Moreover, this workshop also has the objective to serve as a forum not only for presenting cutting-edge research, but also for debating the role of security and its practical implications in the development of the IoT.
LASER 2012 Workshop on Learning from Authoritative Security Experiment Results, Co-located with IEEE Symposium on Security and Privacy 2012, The Westin St. Francis Hotel, San Francisco, CA, USA, May 24, 2012. (Submissions due 26 March 2012)
The goal of this workshop is to provide an outlet for publication of
unexpected research results in security -- to encourage people to share
not only what works, but also what doesn't. This doesn't mean bad
research -- it means research that had a valid hypothesis and methods,
but the result was negative. Given the increased importance of computer
security, the security community needs to quickly identify and learn
from both success and failure.
Journal papers and conferences typically contain papers that report
successful experiments that extend our knowledge of the science of
security, or assess whether an engineering project has performed as
anticipated. Some of these results have high impact; others do not.
Unfortunately, papers reporting on experiments with unanticipated
results that the experimenters cannot explain, or experiments that
are not statistically significant, or engineering efforts that fail
to produce the expected results, are frequently not considered
publishable, because they do not appear to extend our knowledge. Yet,
some of these "failures" may actually provide clues to even more
significant results than the original experimenter had intended. The
research is useful, even though the results are unexpected.
Useful research includes a well-reasoned hypothesis, a well-defined
method for testing that hypothesis, and results that either disprove
or fail to prove the hypothesis. It also includes a methodology documented
sufficiently so that others can follow the same path. When framed in this
way, "unsuccessful" research furthers our knowledge of a hypothesis and
testing method. Others can reproduce the experiment itself, vary the methods,
and change the hypothesis; the original result provides a place to begin.
As an example, consider an experiment assessing a protocol utilizing
biometric authentication as part of the process to provide access to a
computer system. The null hypothesis might be that the biometric technology
does not distinguish between two different people; in other words, that the
biometric element of the protocol makes the approach vulnerable to a
masquerade attack. Suppose the null hypothesis is verified. It would still
be worth publishing this result. First, it might prevent others from
trying the same biometric method. Second, it might lead them to further
develop the technology - to determine whether a different style of
biometrics would improve matters, or if the environment in which
authentication is being attempted makes a difference. For example, a
retinal scan may be a failure in recognizing people in a crowd, but
successful where the users present themselves one at a time to an admission
device with controlled lighting, or when multiple "tries" are included.
Third, it might lead to modifying the encompassing protocol so as to
make masquerading more difficult for some other reason.
Equally important is research designed to reproduce the results of
earlier work. Reproducibility is key to science, to validate or uncover
errors or problems in earlier work. Failure to reproduce the results
leads to a deeper understanding of the phenomena that the earlier work
uncovers.
The workshop focuses on research that has a valid hypothesis and
reproducible experimental methodology, but where the results were
unexpected or did not validate the hypotheses, where the methodology
addressed difficult and/or unexpected issues, or that identified
previously unsuspected confounding issues. We solicit research and
position papers addressing these issues, especially (but not
exclusively) on the following topics:
TrustBus 2012 9th International Conference on Trust, Privacy, and Security in Digital Business, Held in conjunction with DEXA 2012, Vienna University of Technology, Austria, September 3-7, 2012. (Submissions due 6 April 2012)
The advances in the Information and Communication Technologies (ICT) have raised new opportunities for the implementation of novel applications and the provision of high quality services over global networks. The aim is to utilize this information society era?for improving the quality of life for all citizens, disseminating knowledge, strengthening social cohesion, generating earnings and finally ensuring that organizations and public bodies remain competitive in the global electronic marketplace. Unfortunately, such a rapid technological evolution cannot be problem-free. Concerns are raised regarding the lack of trust?in electronic procedures and the extent to which information security?and user privacy?can be ensured. In answer to these concerns, the 9th International Conference on Trust, Privacy and Security in Digital Business (TrustBus?2) will provide an international forum for researchers and practitioners to exchange information regarding advancements in the state of the art and practice of trust and privacy in digital business. TrustBus?2 will bring together researchers from different disciplines, developers, and users all interested in the critical success factors of digital business systems. We are interested in papers, work-in-progress reports, and industrial experiences describing advances in all areas of digital business applications related to trust and privacy, including, but not limited to:
HealthSec 2012 3rd USENIX Workshop on Health Security and Privacy, Bellevue, WA, USA, August 6-7, 2012. (Submissions due 10 April 2012)
The focus of HealthSec '12 will be on the development of new techniques and policies to ensure the privacy and security of next-generation healthcare systems and devices. HealthSec is intended as a forum for lively discussion of aggressively innovative and potentially disruptive ideas on all aspects of medical and health security and privacy. We strongly encourage cross-disciplinary interactions between fields, including, but not limited to, technology, medicine, and policy.
CloudSec 2012 4th International Workshop on Security in Cloud Computing, Held in conjunction with the 41st ICPP, Pittsburgh, PA, USA, September 12, 2012. (Submissions due 15 April 2012)
Cloud Computing has generated interest from both industry and academia since 2007. As an extension of Grid Computing and Distributed Computing, Cloud Computing aims to provide users with flexible services in a transparent manner. Services are allocated in a cloud, which is a collection of devices and resources connected through the Internet. Before this paradigm can be widely accepted, the security, privacy and reliability provided by the services in the cloud must be well established. CloudSec 2012 will bring researchers and experts together to present and discuss the latest developments and technical solutions concerning various aspects of security issues in Cloud Computing. CloudSec 2012 seeks original unpublished papers focusing on theoretical analysis, emerging applications, novel system architecture construction and design, experimental studies, and social impacts of Cloud Computing. Both review/survey papers and technical papers are encouraged. CloudSec 2012 also welcomes short papers related to Security in Cloud Computing, which summarize speculative breakthroughs, work-in-progress, industry featured projects, open problems, new application challenges, visionary ideas, and preliminary studies. The topics include but are not limited to:
SSS 2012 14th International Symposium on Stabilization, Safety, and Security of Distributed Systems, Toronto, Canada, October 1-4, 2012. (Submissions due 16 April 2012)
The SSS symposium is a prestigious international forum for researchers and practitioners in the design and development of fault-tolerant distributed systems with self-* properties, such as self-stabilizing, self-configuring, self-organizing, self-managing, self-repairing, self-healing, self-optimizing, self-adaptive, and self-protecting systems. Research in distributed systems is now at a crucial point in its evolution, marked by the importance of dynamic systems such as cloud networks, social networks, peer-to-peer networks, large-scale wireless sensor networks, mobile ad hoc networks, etc., and many new applications such as grid and web services, banking and e-commerce, e-health and robotics, aerospace and avionics, automotive, industrial process control, etc. have joined the traditional applications of distributed systems.
CSET 2012 5th Workshop on Cyber Security Experimentation and Test, Bellevue, WA, USA, August 6, 2012. (Submissions due 19 April 2012)
The science of cyber security is challenging for a number of reasons. Meeting these challenges requires transformational advances, including understanding of the relationship between scientific method and cyber security evaluation, advancing capabilities of underlying experimental infrastructure, and improving data usability. CSET invites submissions on the science of cyber security evaluation, as well as experimentation, measurement, metrics, data, and simulations as those subjects relate to computer and network security.
ProvSec 2012 6th International Conference on Provable Security, Chengdu, China, September 26-28, 2012. (Submissions due 20 April 2012)
Provable security is an important research area in modern cryptography. Cryptographic primitives or protocols without a rigorous proof cannot be regarded as secure even in practice. In fact, there are many schemes that were originally thought as secure but eventually broken, which clearly indicates the need of formal security assurance. With provable security, we are confident in using cryptographic schemes and protocols in various real-world applications. Meanwhile, schemes with provable security sometimes give only theoretical feasibility rather than a practical construction, and correctness of the proofs may be difficult to verify. ProvSec conference thus provides a platform for researchers, scholars and practitioners to exchange new ideas for solving these problems in the provable security area. Topics include all aspects of provable security for cryptographic primitives or protocols, and include but are not limited to the following areas:
ACM-CCS 2012 19th ACM Conference on Computer and Communications Security, Raleigh, North Carolina, USA, October 16-18, 2012. (Submissions due 4 May 2012)
The annual ACM Computer and Communications Security Conference is a leading international forum for information security researchers, practitioners, developers, and users to explore cutting-edge ideas and results, and to exchange techniques, tools, and experiences. The conference seeks submissions from academia, government, and industry presenting novel research on all practical and theoretical aspects of computer and communications security. Papers should have relevance to the construction, evaluation, application, or operation of secure systems. Theoretical papers must make a convincing argument for the practical significance of the results. All topic areas related to computer and communications security are of interest and in scope. Accepted papers will be published by ACM Press in the conference proceedings. Outstanding papers will be invited for possible publication in a special issue of the ACM Transactions on Information and System Security.
NSS 2012 6th International Conference on Network and System Security, Wu Yi Shan, Fujian, China, November 21-23, 2012. (Submissions due 15 June 2012)
NSS is an annual international conference covering research in network and system security. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of network security, privacy, applications security, and system security. Papers describing case studies, implementation experiences, and lessons learned are also encouraged. Topics of interest include but are not limited to:
IEEE Internet Computing, Track Articles on Computer Crime, 2012, (Submission will be accepted for this track from 15 July 2011 to 15 July 2012)
Editors: Nasir Memon (New York University, USA) and Oliver Spatscheck (AT&T, USA)
As the Internet has grown and extended its reach into every part of people's
lives, it shouldn't be surprising that criminals have seized the opportunity
to expand their activities into this new realm. This has been fostered in
particular by the fact that the Internet was designed as an open and trusting
environment. Unfortunately many of these architectural choices are fundamental
to the Internet's success and current architecture and are therefore hard to
overcome. Computer crime ranges from rather simple crimes such as theft of
intellectual property or computer and network resources to complex cooperate
espionage or even cyber terrorism. This special track for Internet Computing
seeks original articles that cover computer crime as it relates to the
Internet. Appropriate topics include:
Listing of academic positions available by
Cynthia Irvine
Staying in touch....
Changing your email address? Please send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TC | TC publications available online | |
TC Publications for sale | Cipher past issues archive | |
IEEE Computer Society | Cipher Privacy Policy |