posted by user: jsalazar || 4861 views || tracked by 8 users: [display]

ProvSec 2011 : Conference on Provable Security


Conference Series : Provable Security
When Aug 16, 2011 - Aug 18, 2011
Where Xi'an, China
Submission Deadline May 1, 2011
Notification Due Jun 20, 2011
Final Version Due Jul 5, 2011
Categories    cryptography

Call For Papers

Instructions for ProvSec
Provable security is an important research area in modern cryptography. Cryptographic primitives or protocols without a rigorous proof cannot be regarded as secure even in practice. In fact, there are many schemes that were originally thought as secure but eventually broken, which clearly indicates the need of formal security assurance. With provable security, we are confident in using cryptographic schemes and protocols in various real-world applications. Meanwhile, schemes with provable security sometimes give only theoretical feasibility rather than a practical construction, and correctness of the proofs may be difficult to verify. ProvSec conference thus provides a platform for researchers, scholars and practitioners to exchange new ideas for solving these problems in the provable security area.

The first ProvSec conference was successfully held on Nov. 1-2, 2007 at the University of Wollongong, Australia and the proceedings were published in LNCS Vol. 4784. The second ProvSec conference was held in Shanghai, China on Oct. 30-Nov. 1, 2008 and the proceedings were published in LNCS Vol. 5324. The third conference was held in Guangzhou, China on Nov. 11-13, 2009 and the proceedings were published in LNCS Vol.5848. The Fourth ProvSec was held in Malacca, Malaysia on October 13-15, 2010. The proceedings is published as an LNCS volume entitled "Provable Security" from Springer (Online).

Topics include all aspects of provable security for cryptographic primitives or protocols,and include but are not limited to the following areas:

•Cryptographic primitives
•Security notions, approaches, and paradigms
•Formal security model
•Secure cryptographic protocols and applications
•Provable secure block ciphers and hash functions
•Digital signatures
•Privacy and anonymity technologies
•Steganography and steganalysis
•Lattice-based security reductions
•Pairing-based provably secure cryptography
Instructions for authors
Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel for consideration of any other journal, conference/workshop with proceedings. The submission should begin with a title followed by a short abstract and keywords. Submissions should have at most 12 pages excluding the bibliography and appendices, and at most 20 pages in total, using at least 11-point fonts and with reasonable margins. All submissions should be anonymous. Authors of accepted papers must guarantee that at least one of the authors will attend the conference and present their paper.

Submission instructions
Papers must be submitted electronically through the submission web page. Electronic submissions must conform to the procedure described in the submission server and must be received by the deadline indicated below. Electronic submission via the described interface is the only form of submission considered.

Conference Proceedings
The conference proceedings will be published by Springer-Verlag in the Lecture Notes in Computer Science series.

Related Resources

IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA
NordSec 2022   The 27th Nordic Conference on Secure IT Systems
SI on AdCTI 2022   Special Issue on Advances in Cyber Threat Intelligence 2022, Security and Communication Networks, Wiley & Hindawi
MLTEC 2022   3rd International Conference on Machine Learning Techniques
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
ICSS 2022   8th International Conference on Software Security
MDA AI&PR 2023   18th International Conference on Mass Data Analysis of Images and Signals with Applications in Medicine, r/g/b Biotechnology, Food Industries and Dietetics, Biometry and Security,
IJFCST 2022   International Journal on Foundations of Computer Science & Technology
EICC 2023   European Interdisciplinary Cybersecurity Conference (EICC 2023)
doors 2023   3rd Edge Computing Workshop