PETS: Privacy Enhancing Technologies

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2017 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
PETS 2016 Privacy Enhancing Technologies Symposium / Proceedings on Privacy Enhancing Technologies
Jul 19, 2016 - Jul 22, 2016 Darmstadt, Germany TBD
PETS 2015 Privacy Enhancing Technologies Symposium
Jun 30, 2015 - Jul 2, 2015 Drexel University, Philadelphia, PA, USA Nov 22, 2014
PETS 2014 Privacy Enhancing Technologies
Jul 16, 2014 - Jul 18, 2014 Amsterdam, Netherlands Feb 13, 2014 (Feb 10, 2014)
PETS 2013 Privacy Enhancing Technologies Symposium
Jul 10, 2013 - Jul 12, 2013 Bloomington, Indiana Feb 19, 2013 (Feb 15, 2013)
PETS 2012 The 12th Privacy Enhancing Technologies Symposium
Jul 11, 2012 - Jul 13, 2012 Vigo, Spain Feb 20, 2012
PETS 2011 11th Privacy Enhancing Technologies Symposium
Jul 27, 2011 - Jul 29, 2011 Waterloo, Canada Feb 28, 2011
PETS 2010 10th Privacy Enhancing Technologies Symposium
Jul 21, 2010 - Jul 23, 2010 Berlin, Germany Feb 15, 2010
PETS 2009 The 9th Privacy Enhancing Technologies Symposium
Aug 5, 2009 - Aug 7, 2009 Seattle, WA, USA Mar 2, 2009
 
 

Present CFP : 2016

---------------------------------------------------------
Call for Papers

16th Privacy Enhancing Technologies Symposium (PETS 2016)
Darmstadt, Germany
July 19 – July 22, 2016
http://petsymposium.org/
---------------------------------------------------------

The annual Privacy Enhancing Technologies Symposium (PETS) brings
together privacy experts from around the world to discuss recent
advances and new perspectives on research in privacy technologies. PETS
addresses the design and realization of privacy services for the
Internet and other digital systems and communication networks.

PETS seeks paper and panel submissions for its 16th event to be
organised by TU Darmstadt and held in Darmstadt, Germany, on July 19 –
July 22, 2016. Papers should present novel practical and/or theoretical
research into the design, analysis, experimentation, or fielding of
privacy-enhancing technologies. While PETS has traditionally been home
to research on anonymity systems and privacy-oriented cryptography, we
strongly encourage submissions on a number of both well-established and
emerging privacy-related topics.

New model as of PETS 2015: Papers undergo a journal-style reviewing
process and accepted papers are published in the journal Proceedings on
Privacy Enhancing Technologies (PoPETs). PoPETs, a scholarly, open
access journal for timely research papers on privacy, has been
established as a way to improve reviewing and publication quality while
retaining the highly successful PETS community event. PoPETs will be
published by De Gruyter Open, the world's second largest publisher of
Open Access academic content, and part of the De Gruyter group, which
has over 260 years of publishing history.

NEW as of PETS 2016: PETS 2016 also solicits submissions for
Systematization of Knowledge (SoK) papers. These are papers that
critically review, evaluate, and contextualize work in areas for which a
body of prior literature exists, and whose contribution lies in
systematizing the existing knowledge in that area. To be suitable for
publication, SoK articles must provide an added value beyond a
literature review, such as novel insights, identification of research
gaps, or challenges to commonly held assumptions. SoK papers will follow
the same review process as other submissions, and will be published in
PoPETs and presented at the PETS 2016 event.

Authors can submit papers to PoPETs four times a year, every three
months on a predictable schedule. Authors are notified of the decisions
about two months after submission. In addition to accept and reject
decisions, papers may be provided with ‘major revision’ decisions, in
which case authors are invited to revise and resubmit their article to
one of the following two submission deadlines. We endeavor to assign the
same reviewers to revised versions. Papers accepted for publication
within or before the February deadline round will be presented at that
year's symposium. Note that accepted papers must be presented at PETS.

Authors are encouraged to view our FAQ about the submission process.

Important Dates for PETS 2016

All deadlines are 17:00 UTC

Issue 1:
Paper submission deadline: April 15, 2015 (firm)
Rebuttal period: May 23 – 25, 2015
Author notification: June 15, 2015
Camera-ready deadline for accepted papers and minor revisions (if
accepted by the shepherd): July 15, 2015

Issue 2:
Paper submission deadline: August 31, 2015 (firm)
Rebuttal period: October 12 – 14, 2015
Author notification: November 2, 2015
Camera-ready deadline for accepted papers and minor revisions (if
accepted by the shepherd): December 2, 2015

Issue 3
Paper submission deadline: November 30, 2015 (firm)
Rebuttal period: January 11 – 13, 2016
Author notification: February 1, 2016
Camera-ready deadline for accepted papers and minor revisions (if
accepted by the shepherd): March 1, 2016

Issue 4:
Paper submission deadline: February 29, 2016 (firm)
Rebuttal period: April 11 – 13, 2016
Author notification: May 2, 2016
Camera-ready deadline for accepted papers and minor revisions (if
accepted by the shepherd): June 2, 2016

Papers which were submitted to a previous PETS deadline and invited to
resubmit after major revisions can submit the revised paper up to two
weeks after the stated deadline. Such papers must however be registered
by the usual deadline. Papers which were not submitted to a previous
deadline or submissions which were rejected from a previous PETS issue
must be submitted by the stated deadline. To be considered as a major
revision, papers invited to resubmit must be registered in one of the
next two rounds following the decision; otherwise the paper will be
treated as a new submission.

Suggested topics include but are not restricted to:

Behavioural targeting
Building and deploying privacy-enhancing systems
Crowdsourcing for privacy
Cryptographic tools for privacy
Data protection technologies
Differential privacy
Economics of privacy and game-theoretical approaches to privacy
Forensics and privacy
Human factors, usability and user-centered design for PETs
Information leakage, data correlation and generic attacks to privacy
Interdisciplinary research connecting privacy to economics, law,
ethnography, psychology, medicine, biotechnology
Location and mobility privacy
Measuring and quantifying privacy
Obfuscation-based privacy
Policy languages and tools for privacy
Privacy and human rights
Privacy in ubiquitous computing and mobile devices
Privacy in cloud and big-data applications
Privacy in social networks and microblogging systems
Privacy-enhanced access control, authentication, and identity management
Profiling and data mining
Reliability, robustness, and abuse prevention in privacy systems
Surveillance
Systems for anonymous communications and censorship resistance
Traffic analysis
Transparency enhancing tools

General Chair (gc16@petsymposium.org)
Ahmad-Reza Sadeghi, TU Darmstadt

Program Chairs/Co-Editors-in-Chief (pets16-chairs@petsymposium.org)
Claudia Diaz, KU Leuven
Apu Kapadia, Indiana University Bloomington

Program Committee/Editorial Board:
Alessandro Acquisti, Carnegie Mellon University
Sadia Afroz, UC Berkeley
Elena Andreeva, KU Leuven
Adam Aviv, United States Naval Academy
Erman Ayday, Bilkent University
Lujo Bauer, Carnegie Mellon University
Mihir Bellare, University of California, San Diego
Steven Bellovin, Columbia University
Matt Blaze, University of Pennsylvania
Nikita Borisov, University of Illinois at Urbana-Champaign
Ian Brown, Oxford Internet Institute
Sonja Buchegger, KTH
Kevin Butler, University of Florida
Aylin Caliskan-Islam, Drexel University / Princeton University
Jan Camenisch, IBM Research – Zurich
Kostas Chatzikokolakis, Lix Ecole Polytechnique
Graham Cormode, University of Warwick
Lorrie Cranor, Carnegie Mellon University
George Danezis, University College London
Anupam Datta, Carnegie Mellon University
Emiliano De Cristofaro, University College London
Roberto Di Pietro, Bell Labs France
Roger Dingledine, The Tor Project
Orr Dunkelman, University of Haifa
Serge Egelman, UC Berkeley
William Enck, NC State University
Roya Ensafi, Princeton University
Zekeriya Erkin, TU Delft
David Fifield, University of California, Berkeley
Bryan Ford, Yale University / EPFL
Ian Goldberg, University of Waterloo
Thomas Groß, Newcastle University
Carl Gunter, University of Illinois at Urbana-Champaign
Seda Gurses, NYU / Princeton University
Marit Hansen, Independent Centre for Privacy Protection
Schleswig-Holstein
Nadia Heninger, University of Pennsylvania
Ryan Henry, Indiana University Bloomington
Cormac Herley, Microsoft Research
Amir Herzberg, Bar Ilan University
Alejandro Hevia, Universidad de Chile
Raquel Hill, Indiana University Bloomington
Jaap-Henk Hoepman, Radboud University Nijmegen
Nick Hopper, University of Minnesota
Amir Houmansadr, University of Massachusetts, Amherst
Yan Huang, Indiana University Bloomington
Jean-Pierre Hubaux, EPFL
Rob Jansen, U.S. Naval Research Laboratory
Aaron Johnson, U.S. Naval Research Laboratory
Mohamed Ali (Dali) Kaafar, NICTA Australia
Seny Kamara, Microsoft Research
Jonathan Katz, University of Maryland
Stefan Katzenbeisser, TU Darmstadt
Aggelos Kiayias, University of Athens
Negar Kiyavash, University of Illinois at Urbana-Champaign
Bart Knijnenburg, Clemson University
Yoshi Kohno, University of Washington
Aleksandra Korolova, Stanford / Google / University of
Southern California
Tanja Lange, Technische Universiteit Eindhoven
Peeter Laud, Cybernetica
Brian Levine, University of Massachusetts, Amherst
Nick Mathewson, The Tor Project
Damon McCoy, New York University
Tyler Moore, Southern Methodist University
Martin Mulazzani, SBA Research
Shirin Nilizadeh, UCSB
Helen Nissenbaum, New York University
Guevara Noubir, Northeastern University
Kenny Paterson, Royal Holloway, University of London
Adrian Perrig, ETHZ
Bart Preneel, KU Leuven
Thomas Ristenpart, University of Wisconsin‑Madison
Mike Rosulek, Oregon State University
Reihaneh Safavi-Naini, University of Calgary
Angela Sasse, University College London
Micah Sherr, Georgetown University
Adam Smith, Pennsylvania State University
Thorsten Strufe, TU Dresden
Paul Syverson, U.S. Naval Research Laboratory
Patrick Traynor, University of Florida
Michael Tschantz, UC Berkeley
Kami Vaniea, University of Edinburgh
Yang Wang, Syracuse University
Joss Wright, Oxford Internet Institute
Matthew Wright, UT Arlington

HotPETs Chairs (hotpets16@petsymposium.org)
Sadia Afroz, UC Berkeley
Moritz Barti, Hermes Center for Transparency and
Digital Human Rights
Aaron Johnson, U.S. Naval Research Laboratory

PET Award Chairs (award-chairs16@petsymposium.org)
Nicholas Hopper, University of Minnesota
Carmela Troncoso, GRADIANT / IMDEA

Publicity Chairs (publicity16@petsymposium.org)
Tariq Elahi, University of Waterloo / KU Leuven
Kat Hanna

Publications Chair (publication16@petsymposium.org)
Qatrunnada Ismail, Indiana University Bloomington

Stipend Chairs (pets2016-stipend@petsymposium.org)
Roger Dingledine, The Tor Project
Andrei Serjantov

Local Organizing Team
Ann-Kathrin Braun
Thomas Schneider (family support, childcare)

Submission Guidelines

Papers to be submitted to the PET Symposium must be at most 15 pages
excluding bibliography and appendices and 20 pages total in De Gruyter
Open format (zip file). PC members are not required to read the
appendices, which should only be used to support evidence of the
submission's technical validity, e.g., for detailed security proofs.
Also, all papers must be anonymized (more information below). Papers not
following these instructions risk being rejected without consideration
of their merits.

Submitted papers must not substantially overlap with papers that have
been published or that are simultaneously submitted to a journal or a
conference with proceedings.

The paper should start with the title and an abstract. The introduction
should give some background and summarize the contributions of the paper
at a level appropriate for a non-specialist reader.

Anonymization of Submissions

All submitted papers will be judged based on their quality and relevance
through double-blind reviewing, where the identities of the authors are
withheld from the reviewers. As an author, you are required to make a
good-faith effort to preserve the anonymity of your submission, while at
the same time allowing the reader to fully grasp the context of related
past work, including your own. It is recognized that, at times,
information regarding the identities of authors may become public
outside the submission process (e.g., if a pre-print is published as a
technical report or on a pre-print server) – the PC will ignore this
external information. Minimally, please take the following steps when
preparing your submission:

* Remove the names and affiliations of authors from the title page.
* Remove acknowledgment of identifying names and funding sources.
* Use care in referring to related work, particularly your own. Do not
omit references to provide anonymity, as this leaves the reviewer unable
to grasp the context. Instead, reference your past work in the third
person, just as you would any other piece of related work by another
author.

Ethics

Papers describing experiments with users or user data (e.g., network
traffic, passwords, social network information), should follow the basic
principles of ethical research, e.g., beneficence (maximizing the
benefits to an individual or to society while minimizing harm to the
individual), minimal risk (appropriateness of the risk versus benefit
ratio), voluntary consent, respect for privacy, and limited deception.
Authors are encouraged to include a subsection on Ethical Principles if
human subjects research is conducted, and such a discussion may be
required if deemed necessary during the review process. Authors are
encouraged to contact PC chairs before submitting to clarify any doubts.

Copyright

Accepted papers will be published as an Open Access Journal by De
Gruyter Open, the world's second largest publisher of Open Access
academic content, and part of the De Gruyter group, which has over 260
years of publishing history. Authors retain copyright of their work.
Papers will be published under an open-access policy using a Creative
Commons Attribution-NonCommercial-NoDerivs license.

Best Student Paper Award

The Andreas Pftzmann PETS 2016 Best Student Paper Award will be selected
at PETS 2016. Papers written solely or primarily by a student who is
presenting the work at PETS 2016 are eligible for the award.

Submission

Papers will need to be submitted via the PETS 2016 submission server.
The URL for Issue 2 is: https://cgi.soic.indiana.edu/~pets2016/issue2/.

HotPETs

As with the last several years, part of the symposium will be devoted to
HotPETs — the "hottest," most exciting research ideas still in a
formative state. Further information will be published on the PETS 2016
website soon.

Panel Submissions

We also invite proposals of up to 2 pages for panel discussions or other
relevant presentations. In your proposal, (1) describe the nature of the
presentation and why it is appropriate to the symposium, (2) suggest a
duration for the presentation (ideally between 45 and 90 minutes), and
(3) suggest some possible presenters.

Submit your proposal in the same manner as a PoPETs paper by the
February deadline. (All panel proposals received by the February
deadline will receive full consideration for that year's PETS.) Please
begin your panel title with "Panel Proposal:". The program committee
will consider panel proposals along with other symposium events and will
respond by the paper decision date with an indication of its interest in
scheduling the event.
 

Related Resources

PETS-Fourth-Issue 2017   17th Privacy Enhancing Technologies Symposium
ICML 2017   34rd International Conference on Machine Learning
PETS-Third-Issue 2017   17th Privacy Enhancing Technologies Symposium
IJE 2016   International Journal of Education
PST 2016   14th International Conference on Privacy, Security and Trust
IEEE ICECCT 2017   2017 IEEE International Conference on Electrical, Computer and Communication Technologies
WICSPIT 2017   IoTBDS/SMARTGREENS Workshop -- Innovative CyberSecurity and Privacy for Internet of Things: Strategies, Technologies, and Implementations
ICST 2017   IEEE International Conference on Software Testing, Verification and Validation (ICST) 2017
JIP SI: Computer Security Technologies 2017   Journal of Information Processing, Special issue of “Computer Security Technologies against Sophisticated Cyber Attacks”
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy