|
|
Conference and Workshop Announcements
Commentary and Opinion
Sven Dietrich's review of Cryptography by William J. Buchanan OBE
News Items: Announcements and correspondence from readers (please contribute!)
Listing of academic positions available by
Cynthia Irvine
Posted November 2018
University of Nebraska-Lincoln
Lincoln, Nebraska, USA
Assistant Professor of Computer Science and Engineering (Cybersecurity)
Closes November 15, 2018, but open until filled
URL of position description: https://cse.unl.edu/facultysearch#13299
Cipher
calls-for-papers
and
calendar
Cipher calendar announcements are on Twitter; follow "ciphernews"
Requests for inclusion in the list should sent per instructions.
new calls or announcements added since Cipher E145
(the calls-for-papers and the calendar announcements may differ
slightly in content or time of update):
SP 2019 40th IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 20-22, 2019. (Submissions Due first day of each month)
Since 1980 in Oakland, the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Topics of interest include:
EuroSP 2019 4th IEEE European Symposium on Security and Privacy, Stockholm, Sweden, June 17-19, 2019. (Submissions Due 13 November 2018)
The IEEE European Symposium on Security and Privacy (EuroS&P) is the European sister conference of the established IEEE S&P symposium. It is a premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in security or privacy. The emphasis is on building or attacking real systems, even better if actually deployed, rather than presenting purely theoretical results. Papers may present advances in the design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Papers that shed new light on past results by means of sound theory or thorough experimentation are also welcome. Topics of interest include:
MDPI Informatics, Special Issue Human Factors in Security and Privacy in IoT (HFSP-IoT), (Submissions Due 30 November 2018)
Guest Editors: Karen Renaud (Abertay University, UK)
and Melanie Volkamer (Karlsruhe Institute of Technology, Germany).
This special issue of the Informatics journal welcomes submissions on the topic of the
security and privacy in the context of IoT while focusing on the human aspect. IoT contains
smart home including devices such as digital assistances (e.g. google home and alexa) and
smart health, including devices such as fitness tracker. There are several aspects, which
are of high interest for this special issue including:
PET 2019 19th Privacy Enhancing Technologies Symposium, Stockholm, Sweden, July 16-20, 2019. (Submissions Due 31 May 2018, 31 August 2018, 30 November 2018, 28 February 2019)
The annual Privacy Enhancing Technologies Symposium (PETS) brings together privacy experts from around the world to present and discuss recent advances and new perspectives on research in privacy technologies. Papers undergo a journal-style reviewing process and accepted papers are published in the journal Proceedings on Privacy Enhancing Technologies (PoPETs). PoPETs, a scholarly, open access journal for timely research papers on privacy, has been established as a way to improve reviewing and publication quality while retaining the highly successful PETS community event. PoPETs is published by De Gruyter Open, the world's second largest publisher of open access academic content, and part of the De Gruyter group, which has over 260 years of publishing history. PoPETs does not have article processing charges (APCs) or article submission charges. Submitted papers to PETS/PoPETs should present novel practical and/or theoretical research into the design, analysis, experimentation, or fielding of privacy-enhancing technologies. Authors can submit papers to PoPETs four times a year, every three months, and are notified of the decisions about two months after submission. In addition to accept and reject decisions, papers may receive resubmit with major revisions decisions, in which case authors are invited to revise and resubmit their article to one of the following two issues. We endeavor to assign the same reviewers to revised versions. Papers accepted for an issue in the PoPETS 2019 volume must be presented at the symposium PETS 2019.
IEEE Internet Computing Magazine, Special Issue on the Meaning of Identity on the Internet, (Submissions Due 4 December 2018)
Guest Editors: Hilarie Orman (Purple Streak, Inc., USA)
and Kent Seamons (Brigham Young University, USA).
An online identity used to be a simple login name for a time-sharing
system, but today an online presence consists of a fabric of identities
created through websites, apps, and constantly evolving social media.
We constantly deal with people, things, and institutions that have
attributes and history that are varied, subject to change, secured
through questionable practices, and authenticated both formally and
informally. How do we transfer the concept of ñwhoî to an Internet
environment? This special issue will explore new trends in identity
granting, establishment, verification, management, use, and trust
in an Internet computing environment. We would like to highlight
methods that have the potential for easily enabling identities to
be used for a variety of Internet purposes. We envision a Internet
with a secure identity ecosystem that meets the needs of the worldÕs
population of billions of individuals and objects while balancing
privacy and accountability.
The technologies of the future may include blockchain, smart identity
contracts, artificial intelligence, functional encryption, expanded
use of social media identities, identity aggregation techniques, new
types of biometrics, etc. We are interested in articles that cover
how they can contribute to the overall vision. Topics of interest
include but arenÍt limited to the following:
Elsevier Pervasive and Mobile Computing, Special issue on Blockchain Technology and Applications, (Submissions Due 6 December 2018)
Guest Editors: Paolo Mori (Institute of Informatics and Telematics, National Research
Council of Italy, Italy),
Wolfgang Prinz (Fraunhofer Institute for Applied Information Technology, Germany),
Laura Ricci (University of Pisa, Italy), and Edgar Weippl (SBA Research, Austria).
In recent years, the blockchain technology is having an ever growing popularity, in particular
for what concerns its application cryptocurrencies. As a matter of fact, Bitcoin is currently
the most known application of the blockchain technology, and a number of alternative
cryptocurrencies have been defined and are currently used, e.g., Litecoin or Monero.
However, the application of blockchain is not limited to cryptocurrencies. The immutability
of the transactions and the absence of trusted intermediaries make the blockchain
technology suitable to be applied in many research and business scenarios, and a number
of blockchains are currently available on the market. For instance, permissioned
blockchains are meant to address those business scenarios where transactions needs
to be private, and their processing must be executed within a predefined group of known
participants. Moreover, some blockchains (such as Ethereum or Quorum) allow the execution
of Smart Contracts, thus paving the way to a very large plethora of new interesting
applications of the technology in several fields, such as: Internet of Things, Cyber Physical
Systems, Edge Computing, Supply Chain Management, Social Networks, and many others.
The aim of this special issue is to gather latest research results concerning blockchain
technology and its application on relevant scenarios, such as the ones previously listed.
Researchers, experts, and scholars from both industry and academia are encouraged to
present their recent achievements and research directions in this area.
IWSPA 2019 5th International Workshop on Security and Privacy Analytics, Co-located with ACM CODASPY 2019, Dallas, TX, USA, March 27, 2019. (Submissions Due 15 December 2018)
Increasingly, sophisticated techniques from machine learning, data mining, statistics and natural language processing are being applied to challenges in security and privacy fields. However, experts from these areas have no medium where they can meet and exchange ideas so that strong collaborations can emerge, and cross-fertilization of these areas can occur. Moreover, current courses and curricula in security do not sufficiently emphasize background in these areas and students in security and privacy are not emerging with deep knowledge of these topics. Hence, we propose a workshop that will address the research and development efforts in which analytical techniques from machine learning, data mining, natural language processing and statistics are applied to solve security and privacy challenges ("security analytics"). Submissions of papers related to methodology, design, techniques and new directions for security and privacy that make significant use of machine learning, data mining, statistics or natural language processing are welcome. Furthermore, submissions on educational topics and systems in the field of security analytics are also highly encouraged.
CNS 2019 IEEE Conference on Communications and Network Security, Washington, D.C., USA, June 10-12, 2019. (Submissions Due 21 December 2018)
The IEEE Conference on Communications and Network Security (CNS) is a premier forum for cyber security researchers, practitioners, policy makers, and users to exchange ideas, techniques and tools, raise awareness, and share experiences related to all practical and theoretical aspects of communications and network security. The conference seeks submissions from academia, government, and industry presenting novel research results in communications and network security. Particular topics of interest include, but are not limited to:
Springer Human-centric Computing and Information Sciences, Thematic Issue on Security, trust and privacy for Human-centric Internet of Things, (Submissions Due 31 December 2018)
Guest Editors: Yunsick Sung (Dongguk University, Korea),
Isaac Woungang (Ryerson University, Canada), Javier López (University of Málaga, Spain),
Sherali Zeadally (University of Kentucky, USA),
and Damien Sauveron (XLIM (UMR CNRS 7252 / Université de Limoges), France).
The aim of this thematic series is to publish articles that cover the various developments in
theory and practice related to the latest methods, solutions, and case studies in security,
trust, and privacy for human-centric internet of things (IoT). Submitted articles should
present research contributions that help solve the challenges that arise in developing
a secure and privacy-aware human-centric IoT. This can be achieved by proposing
security policies, algorithms, protocols, frameworks, and solutions for human-centric IoT
ecosystems. We also welcome high-quality review articles, which focus on the analysis
and integration of diverse kinds of approaches such as artificial intelligence cognitive
computing, blockchain, big data mining, or soft computing in the area of human-centric
IoT security. Topics of interest include but are not limited to:
Journal of Parallel and Distributed Computing, Special Issue on Security and Privacy in Social Big Data, (Submissions Due 31 December 2018)
Guest Editors: Qin Liu (Hunan University, China),
Md Zakirul Alam Bhuiyan (Fordham University, USA),
Jiankun Hu (University of New South Wales, Australia),
and Jie Wu (Temple University, USA).
The rapid development of social networks dramatically changes the way people think, work,
and interact. As more and more individual users proactively generate, share, and exchange
digital contents through social media, social networks have become a key source of big
data. However, with such vast interconnectivity, convergence of relationships, and shared
user information comes increased security and privacy concerns in social big data. On one
hand, users carelessly posting their personal information on social media which can easily
have their privacy breached. On the other hand, malicious attackers may manipulate such
information to make a profit. There are two important security and privacy issues in social
networks. The first is how to effectively utilize social data while protecting user privacy.
The second is how to guarantee the authenticity of social data for an in-depth data analysis.
Traditional security mechanisms and models tailored to small-scale or isomorphic data are
inadequate to securing social big data which exhibit enormous volume and diverse formats.
Therefore, how to develop scalable cryptographic algorithms/protocols and lightweight
data mining/organization/optimization models to solve the security and privacy challenges
becomes crucial for the successful application of social big data. Any topic related to security
and privacy aspects, e.g., access control, authorization, authorization, and anonymization,
for big data and social networks, will be considered. All aspects of design, theory and
realization are of interest.
ACM WiSec 2019 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Miami beach, FL, USA, May 15-17, 2019. (Submissions Due 25 January 2019)
ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security and privacy in wireless and mobile networks and their applications. In addition to the traditional ACM WiSec topics of physical, link, and network layer security, we welcome papers focusing on the increasingly diverse range of mobile or wireless applications such as Internet of Things, and Cyber-Physical Systems, as well as the security and privacy of mobile software platforms, usable security and privacy, biometrics, and cryptography. The conference welcomes both theoretical as well as systems contributions. Topics of interest include, but are not limited to:
ACM-CCS 2019 26th ACM Conference on Computer and Communications Security, London, United Kingdom, November 11-15, 2019. (Submissions Due 31 January 2019, 15 May 2019, 1 September 2019)
The ACM Conference on Computer and Communications Security (CCS) is the
flagship annual conference of the Special Interest Group on Security, Audit and
Control (SIGSAC) of the Association for Computing Machinery (ACM). The conference
brings together information security researchers, practitioners, developers, and
users from all over the world to explore cutting-edge ideas and results. It provides
an environment to conduct intellectual discussions. From its inception, CCS has
established itself as a high standard research conference in its area. The Conference
on Computer and Communications Security (CCS) seeks submissions presenting
novel contributions related to all real-world aspects of computer security and privacy.
Theoretical papers must make a convincing case for the relevance of their results to
practice. Authors are encouraged to write the abstract and introduction of their paper
in a way that makes the results accessible and compelling to a general computer-security
researcher. In particular, authors should bear in mind that anyone on the program
committee may be asked to give an opinion about any paper.
IMPORTANT: CCS will have three review cycles in 2019: the first with a submission
deadline of January 31, the second with a submission deadline of May 15, and the third
with a tentative submission deadline of September 1. The third review cycle is only for
papers invited for resubmission from the first two cycles; no new submissions will be
considered. Papers rejected from the first review cycle may not be submitted again
(even in revised form) to the second review cycle.
SACMAT 2019 24th ACM Symposium on Access Control Models and Technologies, Toronto, Canada, June 4-6, 2019. (Submissions Due 10 February 2019)
The organizing committee of the 24th ACM Symposium on Access Control Models and Technologies (SACMAT 2019) invites contributions in all aspects of access control. The symposium will provide participants the opportunity to present work at different levels of development, from early work on promising ideas to fully developed technical results as well as system demonstrations. Papers offering novel research contributions are solicited for submission. Accepted papers will be presented at the symposium and published by the ACM in the symposium proceedings. In addition to the regular research track, this year SACMAT will again host a special track -- "Blue Sky/Vision Track". Researchers are invited to submit papers describing promising new ideas and challenges of interest to the community as well as access control needs emerging from other fields. We are particularly looking for potentially disruptive and new ideas which can shape the research agenda for the next 10 years. We encourage submissions that present ideas that may have not been completely developed and experimentally evaluated. Submissions to the regular track covering any relevant area of access control are welcomed. Areas include, but are not limited to, the following:
USENIX-Security 2019 28th USENIX Security Symposium, Santa Clara, CA, USA, August 14-16, 2019. (Submissions Due 15 November 2018, 15 February 2019)
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks. The USENIX Security Symposium is moving to multiple submission deadlines for USENIX Security '19. This change includes changes to the review process and submission policies. Detailed information is available on the USENIX Security Publication Model Changes web page at www.usenix. org/conference/usenixsecurity19/publication-model-change. All researchers are encouraged to submit papers covering novel and scientifically significant practical works in computer security. There will be two quarterly submission deadlines for USENIX Security '19. The fall quarter submissions deadline is Thursday, November 15, 2018, 5:00 pm PST. The winter quarter submissions deadline is Friday, February 15, 2019, 5:00 pm PST. The Symposium will span three days with a technical program including refereed papers, invited talks, posters, panel discussions, and Birds-of-a-Feather sessions. Co-located events will precede the Symposium on August 12 and 13.
Blockchain 2019 IEEE International Conference on Blockchain, Atlanta, GA, USA, July 14-17, 2019. (Submissions Due 1 March 2019)
The emergence and popularity of blockchain techniques will significantly change the way of digital and networking systems' operation and management. In the meantime, the application of blockchain will exhibit a variety of complicated problems and new requirements, which brings more open issues and challenges for research communities. The goal of this conference is to promote community-wide discussion identifying the advanced applications, technologies and theories for blockchain. We seek submissions of papers that invent novel techniques, investigate new applications, introduce advanced methodologies, propose promising research directions and discuss approaches for unsolved issues.
Staying in touch....
Changing your email address? Please send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TCSP (or other TCs) | Open Access Proceedings | |
Cipher past issues archive | ||
IEEE Computer Society | Cipher Privacy Policy |