| |||||||||||||||||
PETS 2013 : Privacy Enhancing Technologies SymposiumConference Series : Privacy Enhancing Technologies | |||||||||||||||||
Link: http://petsymposium.org/2013/ | |||||||||||||||||
| |||||||||||||||||
Call For Papers | |||||||||||||||||
========================================================
PETS 2013: 13th Privacy Enhancing Technologies Symposium July 10-12, 2013, Bloomington, Indiana, USA http://petsymposium.org/ CALL FOR PAPERS ======================================================== The Privacy Enhancing Technologies Symposium (PETS) aims to advance the state of the art and foster a world-wide community of researchers and practitioners to discuss innovation and new perspectives. Papers should present novel theoretical or practical research into the design, analysis, experimentation, or fielding of privacy-enhancing technologies. While PETS has traditionally been home to research on anonymity systems, we strongly encourage submissions in topics such as cryptography, HCI, data privacy, and in emerging areas (e.g., mobile, social, cloud, ubiquitous). Some suggested topics are listed below. KEY DATES (All deadlines are firm) . Abstract submission: February 15, 2013, 23:59 GMT . Paper submission deadline: February 19, 2013, 23:59 GMT . Author notification: March 30, 2013 . Camera-ready deadline: April 27, 2013 TOPICS OF INTEREST . Behavioral targeting . Building and deploying privacy-enhancing systems . Cryptographic tools for privacy . Data protection technologies . Differential and crowd-blending privacy . Economics of privacy and game-theoretical approaches to privacy . Forensics and privacy . Information leakage and attacks on privacy . Interdisciplinary research connecting privacy with economics, law, ethnography, psychology, medicine, biotechnology . Location and mobility privacy . Policy languages and tools for privacy . Privacy in ubiquitous computing and mobile devices . Privacy in cloud and big-data applications . Privacy in social networks and microblogging systems . Privacy-enhanced access control, authentication, and identity management . Profiling and data mining . Reliability, robustness, and abuse prevention in privacy systems . Systems for anonymous communications and censorship resistance . Traffic analysis . Transparency enhancing tools . Usability and user-centered design for PETs ORGANIZATION General Chair XiaoFeng Wang (Indiana University, Bloomington) Program Co-Chairs Emiliano De Cristofaro (PARC) and Matthew Wright (UTA) Program Committee . Alessandro Acquisti, Carnegie Mellon University . Kevin Bauer, MIT Lincoln Laboratory . Michael Brennan, Drexel University . Srdjan Capkun, ETH Zurich . Claude Castelluccia, INRIA Rhone-Alpes . Alexei Czeskis, University of Washington . George Danezis, Microsoft Research Cambridge . Roger Dingledine, The Tor Project . Simone Fischer-Huebner, Karlstad University . Julien Freudiger, PARC . Xinwen Fu, University of Massachusetts Lowell . Seda Gurses, K.U. Leuven . Michael Hay, Colgate University . Jean-Pierre Hubaux, EPFL . Aaron Johnson, U.S. Naval Research Laboratory . Jaeyeon Jung, Microsoft Research Redmond . Apu Kapadia, Indiana University Bloomington . Markulf Kohlweiss, Microsoft Research Cambridge . Balachander Krishnamurthy, AT&T Labs—Research . Adam J. Lee, University of Pittsburgh . Anja Lehmann, IBM Research—Zurich . Marc Liberatore, University of Massachusetts Amherst . Janne Lindqvist, Rutgers University . Benjamin Livshits, Microsoft Research Redmond . Damon McCoy, George Mason University . Prateek Mittal, University of California, Berkeley . Gregory Neven, IBM Research—Zurich . Melek Önen, Eurecom . Siani Pearson, HP Labs, Bristol . Alessandra Sala, Bell Labs Ireland . Pierangela Samarati, Università degli Studi di Milano . Elaine Shi, University of Maryland, College Park . Reza Shokri, EPFL . Radu Sion, Stony Brook University . Jessica Staddon, Google . Carmela Troncoso, Gradiant . Eugene Vasserman, Kansas State University . Lingyu Wang, Concordia University . Ting Yu, North Carolina State University . Nan Zhang, The George Washington University ETHICS Papers describing experiments with users or user data (e.g. network traffic), should follow the basic principles of ethical research, e.g., beneficence (maximizing the benefits to an individual or to society while minimizing harm to the individual), minimal risk (appropriateness of the risk versus benefit ratio), voluntary consent, respect for privacy, and limited deception. Authors may be asked to include explanation of how ethical principles were followed in their final papers should questions arise during the review process. PANEL SUBMISSIONS We also invite proposals of up to 2 pages for panel discussions or other relevant presentations. In your proposal, (1) describe the nature of the presentation and why it is appropriate to the symposium, (2) suggest a duration for the presentation (ideally between 45 and 90 minutes), and (3) suggest some possible presenters. ADDITIONAL INFORMATION Please see complete Call for Papers at http://petsymposium.org/2013/cfp.php for additional information on submission guidelines and copyright agreements. HELP PUBLICIZE PETS If you would like to help publicize PETS within your organization, you are welcome to circulate this email as well as to print and use the flyer at http://petsymposium.org/2013/files/pets_flyer.pdf You can also follow PETS on Twitter: https://twitter.com/PETS_2013 |
|