NSPW: New Security Paradigms Workshop

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2018 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
NSPW 2017 The New Security Paradigms Workshop
Oct 2, 2017 - Oct 4, 2017 Islamorada, FL, USA Apr 14, 2017
NSPW 2016 New Security Paradigms Workshop
Sep 26, 2016 - Sep 29, 2016 Colorado, USA Apr 29, 2016
NSPW 2015 New Security Paradigms Workshop
Sep 8, 2015 - Sep 11, 2015 Twente, The Netherlands Apr 18, 2015
NSPW 2014 New Security Paradigms Workshop (NSPW)
Sep 15, 2014 - Sep 18, 2014 Victoria, BC, Canada Apr 18, 2014
NSPW 2013 New Security Paradigms Workshop
Sep 9, 2013 - Sep 12, 2013 The Banff Centre, Canada Apr 12, 2013
NSPW 2012 New Security Paradigms Workshop
Sep 19, 2012 - Sep 21, 2012 Bertinoro, Italy Apr 6, 2012
NSPW 2011 New Security Paradigms Workshop
Sep 12, 2011 - Sep 15, 2011 Marin County, CA, USA Apr 4, 2011
NSPW 2008 New Security Paradigms Workshop
Sep 22, 2008 - Sep 25, 2008 Olympic Valley, CA, USA Apr 11, 2008
 
 

Present CFP : 2017

The 2017 New Security Paradigms Workshop (NSPW)
October 2-4, Islamorada, FL, USA


Since 1992, the New Security Paradigms Workshop (NSPW) has offered a unique forum for information security research involving high-risk, high-opportunity paradigms, perspectives, and positions. The workshop itself is highly interactive with presentations by authors prepared for in-depth discussions, and ample opportunity to exchange views with open-minded peers. NSPW is also distinguished by its deep-rooted tradition of positive feedback, collegiality, and encouragement.  

NSPW seeks embryonic, disruptive, and unconventional ideas that benefit from early feedback. The ideas are almost always not yet proven, and sometimes infeasible to validate to the extent expected in traditional forums. NSPW seeks ideas pushing the boundaries of science and engineering beyond what would typically be considered mainstream; papers that would be strong candidates in "conventional" information security venues are, as a rule of thumb, a poor fit for NSPW. We welcome papers with perspectives that augment traditional information security, both from computer science and other disciplines that study adversarial relationships (e.g., biology, economics, the social sciences). Submissions typically address current limitations of information security, directly challenge long-held beliefs or the very foundations of security, or view problems from an entirely novel angle leading to new solutions. 

In 2016, more than 50% of the presenters had never attended NSPW before. We are actively trying to continue this trend, and therefore we encourage submissions from new NSPW authors.

####

IMPORTANT DATES

Submissions: April 14, 2017
Author response period: May 26 - June 2, 2017
Acceptance notification: June 16, 2017

####

FINANCIAL AID

NSF has provided financial aid especially for U.S.-based students and
junior faculty. We have a limited amount of financial aid available for
others, as well. We encourage submissions from students, junior faculty, and
others, even if support may be required to attend.

####

SUBMISSION INSTRUCTIONS

Please see the full CFP available on our website:
http://www.nspw.org/cfp/nspw2017-cfp.pdf

Submissions should be made through EasyChair:
https://www.easychair.org/conferences/?conf=nspw2017

####

ATTENDANCE

The workshop itself is invitation-only, with typically 30--35 participants consisting of authors of about 10 accepted papers, panelists, program committee members, and organizers.  One author of each accepted paper must attend; additional authors may be invited if space permits. All participants must commit to a "social contract": no one arrives late, no one leaves early, no laptops, and all attend all sessions of the 2.5 day program, sharing meals in a group setting.  The workshop is preceded by an evening reception allowing attendees to meet each other beforehand.

####

PROGRAM COMMITTEE

Chair: Serge Egelman (egelman@cs.berkeley.edu), UC Berkeley / ICSI, U.S.
Co-Chair: Anil Somayaji (soma@ccsl.carleton.ca), Carleton University, Canada

Adam Aviv (U.S. Naval Academy, U.S.)
Rainer Böhme (University of Innsbruck, Austria)
Benjamin Edwards (IBM Research, U.S.)
Joseph Lorenzo Hall (CDT, U.S.)
Rachel Greenstadt (Drexel University, U.S.)
Marian Harbach (Audi, Germany)
Cormac Herley (Microsoft Research, U.S.)
Heather Lipford (UNC-Charlotte, U.S.)
Brandon Matthews (MIT Lincoln Laboratory, U.S.)
Michelle Mazurek (University of Maryland, U.S.)
Wolter Pieters (TU Delft, The Netherlands)
Christian W. Probst (Technical University of Denmark)
Jessica Staddon (NCSU, U.S.)
Elizabeth Stobert (ETH Zurich, Switzerland)
Julie Thorpe (UOIT, Canada)
Tara Whalen (Google, U.S.)
 

Related Resources

TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
TheWebConf 2018   The Web Conference (The International World Wide Web Conference - WWW2018)
ICASSP 2018   IEEE International Conference on Acoustics, Speech and Signal Processing
COLING 2018   The 27th International Conference on Computational Linguistics (COLING 2018)
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
IJCSITY 2017   International Journal of Computational Science and Information Technology
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
MLDM 2018   14th International Conference on Machine Learning and Data Mining MLDM 2018
ICDM 2018   18th Industrial Conference on Data Mining ICDM 2018