posted by user: PETS_2013 || 9619 views || tracked by 7 users: [display]

PETS 2013 : Privacy Enhancing Technologies Symposium

FacebookTwitterLinkedInGoogle


Conference Series : Privacy Enhancing Technologies
 
Link: http://petsymposium.org/2013/
 
When Jul 10, 2013 - Jul 12, 2013
Where Bloomington, Indiana
Abstract Registration Due Feb 15, 2013
Submission Deadline Feb 19, 2013
Notification Due Mar 30, 2013
Final Version Due Apr 27, 2013
Categories    privacy   anonymity   security
 

Call For Papers

========================================================
PETS 2013: 13th Privacy Enhancing Technologies Symposium
July 10-12, 2013, Bloomington, Indiana, USA
http://petsymposium.org/
CALL FOR PAPERS
========================================================


The Privacy Enhancing Technologies Symposium (PETS) aims to advance the
state of the art and foster a world-wide community of researchers and
practitioners to discuss innovation and new perspectives.
Papers should present novel theoretical or practical research into the
design, analysis, experimentation, or fielding of privacy-enhancing
technologies. While PETS has traditionally been home to research on
anonymity systems, we strongly encourage submissions in topics such as
cryptography, HCI, data privacy, and in emerging areas (e.g., mobile,
social, cloud, ubiquitous). Some suggested topics are listed below.


KEY DATES (All deadlines are firm)

. Abstract submission: February 15, 2013, 23:59 GMT
. Paper submission deadline: February 19, 2013, 23:59 GMT
. Author notification: March 30, 2013
. Camera-ready deadline: April 27, 2013


TOPICS OF INTEREST

. Behavioral targeting
. Building and deploying privacy-enhancing systems
. Cryptographic tools for privacy
. Data protection technologies
. Differential and crowd-blending privacy
. Economics of privacy and game-theoretical approaches to privacy
. Forensics and privacy
. Information leakage and attacks on privacy
. Interdisciplinary research connecting privacy with economics, law,
ethnography, psychology, medicine, biotechnology
. Location and mobility privacy
. Policy languages and tools for privacy
. Privacy in ubiquitous computing and mobile devices
. Privacy in cloud and big-data applications
. Privacy in social networks and microblogging systems
. Privacy-enhanced access control, authentication, and identity management
. Profiling and data mining
. Reliability, robustness, and abuse prevention in privacy systems
. Systems for anonymous communications and censorship resistance
. Traffic analysis
. Transparency enhancing tools
. Usability and user-centered design for PETs


ORGANIZATION

General Chair
XiaoFeng Wang (Indiana University, Bloomington)

Program Co-Chairs
Emiliano De Cristofaro (PARC) and Matthew Wright (UTA)

Program Committee
. Alessandro Acquisti, Carnegie Mellon University
. Kevin Bauer, MIT Lincoln Laboratory
. Michael Brennan, Drexel University
. Srdjan Capkun, ETH Zurich
. Claude Castelluccia, INRIA Rhone-Alpes
. Alexei Czeskis, University of Washington
. George Danezis, Microsoft Research Cambridge
. Roger Dingledine, The Tor Project
. Simone Fischer-Huebner, Karlstad University
. Julien Freudiger, PARC
. Xinwen Fu, University of Massachusetts Lowell
. Seda Gurses, K.U. Leuven
. Michael Hay, Colgate University
. Jean-Pierre Hubaux, EPFL
. Aaron Johnson, U.S. Naval Research Laboratory
. Jaeyeon Jung, Microsoft Research Redmond
. Apu Kapadia, Indiana University Bloomington
. Markulf Kohlweiss, Microsoft Research Cambridge
. Balachander Krishnamurthy, AT&T Labs—Research
. Adam J. Lee, University of Pittsburgh
. Anja Lehmann, IBM Research—Zurich
. Marc Liberatore, University of Massachusetts Amherst
. Janne Lindqvist, Rutgers University
. Benjamin Livshits, Microsoft Research Redmond
. Damon McCoy, George Mason University
. Prateek Mittal, University of California, Berkeley
. Gregory Neven, IBM Research—Zurich
. Melek Önen, Eurecom
. Siani Pearson, HP Labs, Bristol
. Alessandra Sala, Bell Labs Ireland
. Pierangela Samarati, Università degli Studi di Milano
. Elaine Shi, University of Maryland, College Park
. Reza Shokri, EPFL
. Radu Sion, Stony Brook University
. Jessica Staddon, Google
. Carmela Troncoso, Gradiant
. Eugene Vasserman, Kansas State University
. Lingyu Wang, Concordia University
. Ting Yu, North Carolina State University
. Nan Zhang, The George Washington University



ETHICS

Papers describing experiments with users or user data (e.g. network
traffic), should follow the basic principles of ethical research, e.g.,
beneficence (maximizing the benefits to an individual or to society while
minimizing harm to the individual), minimal risk (appropriateness of the
risk versus benefit ratio), voluntary consent, respect for privacy, and
limited deception. Authors may be asked to include explanation of how
ethical principles were followed in their final papers should questions
arise during the review process.


PANEL SUBMISSIONS

We also invite proposals of up to 2 pages for panel discussions or other
relevant presentations. In your proposal, (1) describe the nature of the
presentation and why it is appropriate to the symposium, (2) suggest a
duration for the presentation (ideally between 45 and 90 minutes), and
(3) suggest some possible presenters.


ADDITIONAL INFORMATION

Please see complete Call for Papers at
http://petsymposium.org/2013/cfp.php for additional information on
submission guidelines and copyright agreements.


HELP PUBLICIZE PETS

If you would like to help publicize PETS within your organization, you are
welcome to circulate this email as well as to print and use the flyer at
http://petsymposium.org/2013/files/pets_flyer.pdf
You can also follow PETS on Twitter: https://twitter.com/PETS_2013

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
Applied Sciences (MDPI) SI:Cybersecurity 2024   Applied Sciences (MDPI) Special Issue - Cybersecurity: Advances in Security and Privacy Enhancing Technology
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
S&P 2025   The 45th IEEE Symposium on Security and Privacy
MATHCS 2024   2nd International Conference on Mathematics, Computer Science & Engineering
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ICDTHT 2025   ICDTHT´25 - The 2025 International Conference on Demographic Transition, Health and Technologies
ICMLT 2025   2025 10th International Conference on Machine Learning Technologies (ICMLT 2025)
AIACT 2025   2025 9th International Conference on Artificial Intelligence, Automation and Control Technologies (AIACT 2025)