ESORICS: European Symposium on Research in Computer Security

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2017 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
ESORICS 2016 European Symposium on Research in Computer Security
Sep 26, 2016 - Sep 30, 2016 Heraklion, Greece Apr 22, 2016
ESORICS 2015 ESORICS
Sep 21, 2015 - Sep 25, 2015 Vienna, Austria Apr 4, 2015
ESORICS 2014 19th European Symposium on Research in Computer Security
Sep 7, 2014 - Sep 11, 2014 Wroclaw, Poland Apr 9, 2014
ESORICS 2013 18th European Symposium on Research in Computer Security
Sep 9, 2013 - Sep 11, 2013 Egham, England Apr 10, 2013 (Mar 31, 2013)
ESORICS 2012 17th European Symposium on Research in Computer Security
Sep 10, 2012 - Sep 12, 2012 Pisa, Italy Apr 10, 2012
ESORICS 2011 European Symposium on Research in Computer Security
Sep 12, 2011 - Sep 14, 2011 Leuven, Belgium Mar 21, 2011
ESORICS 2010 15th European Symposium on Research in Computer Security
Sep 20, 2010 - Sep 22, 2010 Athens, Greece Apr 7, 2010
ESORICS 2009 14th European Symposium on Research in Computer Security
Sep 21, 2009 - Sep 25, 2009 Saint Malo, France Apr 17, 2009
ESORICS 2008 13th European Symposium on Research in Computer Security
Oct 6, 2008 - Oct 8, 2008 Malaga, Spain Mar 31, 2008
 
 

Present CFP : 2016

=====================================================================
Call for Papers: ESORICS 2016
21st European Symposium on Research in Computer Security
Heraklion, Crete -- September 26-30, 2016
=====================================================================

WWW: http://bit.ly/esorics2016 / http://www.ics.forth.gr/esorics2016/
Twitter: @sharcs_project, Hashtag: #esorics2016

Overview
------------------------------------
ESORICS is the annual European research event in Computer Security.
The Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the
academic and industrial communities. Papers offering novel research
contributions in computer security are solicited for submission to the
Symposium. The primary focus is on original, high quality, unpublished
research and implementation experiences. We encourage submissions of
papers discussing industrial research and development.


Important Dates
------------------------------------
* Submission due: May 1, 2016 (***EXTENDED***)
* Notification to authors: June 27, 2016
* Camera ready due: July 11, 2016


Topics of Interest
------------------------------------
Topics of interest include, but are not limited to:
* access control
* accountability
* ad hoc networks
* anonymity
* applied cryptography
* authentication
* biometrics
* data and computation integrity
* database security
* data protection
* digital content protection
* digital forensics
* distributed systems security
* embedded systems security
* inference control
* information hiding
* identity management
* information flow control
* information security governance and management
* intrusion detection
* formal security methods
* language-based security
* network security
* phishing and spam prevention
* privacy
* privacy preserving data mining
* risk analysis and management
* secure electronic voting
* security architectures
* security economics
* security metrics
* security models
* security and privacy for big data
* security and privacy in cloud scenarios
* security and privacy in complex systems
* security and privacy in content centric networking
* security and privacy in crowdsourcing
* security and privacy in the IoT
* security and privacy in location services
* security and privacy for mobile code
* security and privacy in pervasive / ubiquitous computing
* security and privacy policies
* security and privacy in social networks
* security and privacy in web services
* security and privacy in cyber-physical systems
* security, privacy and resilience in critical infrastructures
* security verification
* software security
* systems security
* trust models and management
* trustworthy user devices
* usable security and privacy
* web security
* wireless security


Paper Submission Guidelines
------------------------------------
Submissions must be made through EasyChair at:
https://easychair.org/conferences/?conf=esorics2016

Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. The conference proceedings will be
published by Springer in the Lecture Notes in Computer Science series
(LNCS).

All submissions should follow the LNCS template from the time they are
submitted. Submitted papers should be at most 16 pages (using 10-point
font), excluding the bibliography and well-marked appendices, and at
most 20 pages total. Committee members are not required to read the
appendices, so the paper should be intelligible without them. All
submissions must be written in English. Submissions are to be made to
the Submission web site. Only pdf files will be accepted.
Submissions are not anonymous.

Submissions not meeting these guidelines risk rejection without
consideration of their merits. Authors of accepted papers must
guarantee that their papers will be presented at the conference.

Papers must be received by the aforementioned dates, 11:59 p.m.
American Samoa time (UTC-11).


Organisation Committee
------------------------------------
General Chairs:
* Ioannis Askoxylakis, FORTH, GR
* Sotiris Ioannidis, FORTH, GR

Program Committee Chairs:
* Sokratis Katsikas, Norwegian University of Science and Technology, NO
* Catherine Meadows, Naval Research Laboratory, US

Program Committee:
* Gail-Joon Ahn, Arizona State University, US
* Magnus Almgren, Chalmers University of Technology, SE
* Manos Antonakakis, Georgia Institute of Technology, US
* Alessandro Armando, DIBRIS - University of Genova, IT
* Michael Backes, Saarland University and
Max Planck Institute for Software Systems, DE
* Feng Bao, Security & Privacy Lab, Huawei, CN
* Giampaolo Bella, University of Catania, IT
* Carlo Blundo, Università degli Studi di Salerno, IT
* Rainer Boehme, University of Innsbruck, AT
* Stefan Brunthaler, SBA Researh, DE
* Christian Cachin, IBM Research - Zurich, CH
* Liqun Chen, Hewlett Packard Labs, UK
* Tom Chothia, University of Birmingham, UK
* Sherman Chow, Chinese University of Hong Kong, CN
* Cas Cremers, University of Oxford, UK
* Frédéric Cuppens, Telecom Bretagne, FR
* Nora Cuppens-Boulahia, Telecom Bretagne, FR
* Mads Dam, KTH, SE
* Sabrina De Capitani di Vimercati, Università degli
Studi di Milano, IT
* Hervé Debar, Télécom SudParis, FR
* Roberto di Pietro, University of Rome III, IT
* Josep Domingo-Ferrer, Universitat Rovira i Virgili, ES
* Pavlos Efraimidis, Democritus University of Thrace, GR
* Hannes Federrath, University of Hamburg, DE
* Simone Fischer-Hübner, Karlstad University, SE
* Riccardo Focardi, Università Ca' Foscari, Venezia, IT
* Simon Foley, University College Cork, IE
* Sara Foresti, Universita degli Studi di Milano, IT
* Katrin Franke, Norwegian University of Science & Technology, NO
* Felix Freiling, Friedrich-Alexander-Universität
Erlangen-Nürnberg, DE
* Dieter Gollmann, Hamburg University of Technology, DE
* Dimitris Gritzalis, Athens University of Economics
and Business, GR
* Stefanos Gritzalis, University of the Aegean, GR
* Joshua Guttman, Worcester Polytechnic Institute, US
* Gerhard Hancke, City University of Hong Kong, CN
* Marit Hansen, Independent Center for Privacy Protection
Schleswig-Holstein, DE
* Feng Hao, Newcastle University, UK
* Xinyi Huang, Fujian Normal University, CN
* Michael Huth, Imperial College London, UK
* Aaron D. Jaggard, Naval Research Laboratory, US
* Sushil Jajodia, George Mason University, US
* Vasilios Katos, Bournemouth University, UK
* Dogan Kesdogan, University of Regensburg, DE
* Kwangjo Kim, KAIST, KR
* Steve Kremer, INRIA Nancy - Grand Est, FR
* Ralf Kuesters, University of Trier, DE
* Junzuo Lai, Singapore Management University, SG
* Costas Lambrinoudakis, University of Piraeus, GR
* Peeter Laud, Cybernetica AS, EE
* Adam J. Lee, University of Pittsburgh, US
* Ninghui Li, Purdue University, US
* Yingjiu Li, Singapore Management University, SG
* Antonio Lioy, Politecnico di Torino, IT
* Peng Liu, Pennsylvania State University, US
* Javier Lopez, University of Malaga, ES
* Antonio Maña, University of Malaga, ES
* Pratyusa Manadhata, HP Labs, US
* Luigi Mancini, Universita di Roma La Sapienza, IT
* Heiko Mantel, TU Darmstadt, DE
* Olivier Markowitch, Universite Libre de Bruxelles, BE
* Fabio Martinelli, IIT-CNR, IT
* John Mitchell, Stanford University, US
* Katerina Mitrokotsa, Chalmers University of Technology, SE
* Refik Molva, EURECOM, FR
* Charles Morisset, Newcastle University, UK
* Flemming Nielson, Technical University of Denmark, DK
* Rolf Oppliger, eSECURITY Technologies, CH
* Stefano Paraboschi, Universita di Bergamo, IT
* Dusko Pavlovic, University of Hawaii, US
* Roberto Perdisci, University of Georgia, US
* Olivier Pereira, Universite catholique de Louvain, BE
* Günther Pernul, Universität Regensburg, DE
* Wolter Pieters, TBM-ESS, Delft University of Technology, NL
* Michalis Polychronakis, Stony Brook University, US
* Joachim Posegga, University of Passau, DE
* Kui Ren, State University of New York at Buffalo, US
* Peter Ryan, University of Luxembourg, LU
* Andrei Sabelfeld, Chalmers University of Technology, SE
* Pierangela Samarati, Università degli Studi di Milano, IT
* Ravi Sandhu, University of Texas at San Antonio, US
* Ralf Sasse, ETH Zurich, CH
* Nitesh Saxena, University of Alabama at Birmingham, US
* Andreas Schaad, SAP, DE
* Steve Schneider, University of Surrey, UK
* Joerg Schwenk, Ruhr-Universität Bochum, DE
* Basit Shafiq, Lahore University of Management Sciences, PK
* Ben Smyth, Huawei French Resarch Center, FR
* Krzysztof Szczypiorski, Warsaw University of Technology, PL
* A Min Tjoa, Vienna University of Technology, AT
* Aggeliki Tsohou, Ionian University, GR
* Jaideep Vaidya, Rutgers University, US
* Vijay Varadharajan, Macquarie University, AU
* Luca Viganò, King's College London, UK
* Michael Waidner, Fraunhofer SIT, DE
* Cong Wang, City University of Hong Kong, CN
* Edgar Weippl, SBA Research, AT
* Christos Xenakis, University of Piraeus, GR
* Meng Yu, University of Texas at San Antonio, US
* Jianying Zhou, Institute for Infocomm Research, SG
* Sencun Zhu, Penn State University, US

Publicity Chairs:
* Manolis Stamatogiannakis, Vrije Universiteit Amsterdam, NL
* Youki Kadobayashi, NAIST, JP

Sponsors
------------------------------------
ESORICS 2016 is sponsored by:
* Huawei (http://huawei.com / @Huawei)

and Horizon 2020 projects:
* SHARCS (http://sharcs-project.eu / @sharcs_project)
* VirtuWind (http://virtuwind.eu)
 

Related Resources

ACISP 2017   Australasian Conference on Information Security and Privacy
EuropeanSeC 2017   2017 European Security Conference
ICMWT 2017   4th International Conference on Mobile and Wireless Technology
SIGIR 2017   The 40th International ACM SIGIR Conference on Research and Development in Information Retrieval
AEIJ 2016   Advanced Energy: An International Journal
ECML-PKDD 2017   European Conference on Machine Learning and Principles and Practice of Knowledge Discovery
AVSS 2017   14-th IEEE International Conference on Advanced Video and Signal-Based Surveillance
SPTM 2016   Fourth International Conference of Security, Privacy and Trust Management
ECSA 2017   European Conference on Software Architecture
PETS-Fourth-Issue 2017   17th Privacy Enhancing Technologies Symposium