posted by user: PETS_2013 || 8324 views || tracked by 7 users: [display]

PETS 2013 : Privacy Enhancing Technologies Symposium


Conference Series : Privacy Enhancing Technologies
When Jul 10, 2013 - Jul 12, 2013
Where Bloomington, Indiana
Abstract Registration Due Feb 15, 2013
Submission Deadline Feb 19, 2013
Notification Due Mar 30, 2013
Final Version Due Apr 27, 2013
Categories    privacy   anonymity   security

Call For Papers

PETS 2013: 13th Privacy Enhancing Technologies Symposium
July 10-12, 2013, Bloomington, Indiana, USA

The Privacy Enhancing Technologies Symposium (PETS) aims to advance the
state of the art and foster a world-wide community of researchers and
practitioners to discuss innovation and new perspectives.
Papers should present novel theoretical or practical research into the
design, analysis, experimentation, or fielding of privacy-enhancing
technologies. While PETS has traditionally been home to research on
anonymity systems, we strongly encourage submissions in topics such as
cryptography, HCI, data privacy, and in emerging areas (e.g., mobile,
social, cloud, ubiquitous). Some suggested topics are listed below.

KEY DATES (All deadlines are firm)

. Abstract submission: February 15, 2013, 23:59 GMT
. Paper submission deadline: February 19, 2013, 23:59 GMT
. Author notification: March 30, 2013
. Camera-ready deadline: April 27, 2013


. Behavioral targeting
. Building and deploying privacy-enhancing systems
. Cryptographic tools for privacy
. Data protection technologies
. Differential and crowd-blending privacy
. Economics of privacy and game-theoretical approaches to privacy
. Forensics and privacy
. Information leakage and attacks on privacy
. Interdisciplinary research connecting privacy with economics, law,
ethnography, psychology, medicine, biotechnology
. Location and mobility privacy
. Policy languages and tools for privacy
. Privacy in ubiquitous computing and mobile devices
. Privacy in cloud and big-data applications
. Privacy in social networks and microblogging systems
. Privacy-enhanced access control, authentication, and identity management
. Profiling and data mining
. Reliability, robustness, and abuse prevention in privacy systems
. Systems for anonymous communications and censorship resistance
. Traffic analysis
. Transparency enhancing tools
. Usability and user-centered design for PETs


General Chair
XiaoFeng Wang (Indiana University, Bloomington)

Program Co-Chairs
Emiliano De Cristofaro (PARC) and Matthew Wright (UTA)

Program Committee
. Alessandro Acquisti, Carnegie Mellon University
. Kevin Bauer, MIT Lincoln Laboratory
. Michael Brennan, Drexel University
. Srdjan Capkun, ETH Zurich
. Claude Castelluccia, INRIA Rhone-Alpes
. Alexei Czeskis, University of Washington
. George Danezis, Microsoft Research Cambridge
. Roger Dingledine, The Tor Project
. Simone Fischer-Huebner, Karlstad University
. Julien Freudiger, PARC
. Xinwen Fu, University of Massachusetts Lowell
. Seda Gurses, K.U. Leuven
. Michael Hay, Colgate University
. Jean-Pierre Hubaux, EPFL
. Aaron Johnson, U.S. Naval Research Laboratory
. Jaeyeon Jung, Microsoft Research Redmond
. Apu Kapadia, Indiana University Bloomington
. Markulf Kohlweiss, Microsoft Research Cambridge
. Balachander Krishnamurthy, AT&T Labs—Research
. Adam J. Lee, University of Pittsburgh
. Anja Lehmann, IBM Research—Zurich
. Marc Liberatore, University of Massachusetts Amherst
. Janne Lindqvist, Rutgers University
. Benjamin Livshits, Microsoft Research Redmond
. Damon McCoy, George Mason University
. Prateek Mittal, University of California, Berkeley
. Gregory Neven, IBM Research—Zurich
. Melek Önen, Eurecom
. Siani Pearson, HP Labs, Bristol
. Alessandra Sala, Bell Labs Ireland
. Pierangela Samarati, Università degli Studi di Milano
. Elaine Shi, University of Maryland, College Park
. Reza Shokri, EPFL
. Radu Sion, Stony Brook University
. Jessica Staddon, Google
. Carmela Troncoso, Gradiant
. Eugene Vasserman, Kansas State University
. Lingyu Wang, Concordia University
. Ting Yu, North Carolina State University
. Nan Zhang, The George Washington University


Papers describing experiments with users or user data (e.g. network
traffic), should follow the basic principles of ethical research, e.g.,
beneficence (maximizing the benefits to an individual or to society while
minimizing harm to the individual), minimal risk (appropriateness of the
risk versus benefit ratio), voluntary consent, respect for privacy, and
limited deception. Authors may be asked to include explanation of how
ethical principles were followed in their final papers should questions
arise during the review process.


We also invite proposals of up to 2 pages for panel discussions or other
relevant presentations. In your proposal, (1) describe the nature of the
presentation and why it is appropriate to the symposium, (2) suggest a
duration for the presentation (ideally between 45 and 90 minutes), and
(3) suggest some possible presenters.


Please see complete Call for Papers at for additional information on
submission guidelines and copyright agreements.


If you would like to help publicize PETS within your organization, you are
welcome to circulate this email as well as to print and use the flyer at
You can also follow PETS on Twitter:

Related Resources

SI on ATD&IS 2021   Special Issue on Advanced Technologies in Data and Information Security, Applied Sciences, MDPI
IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
S&P 2022   IEEE Symposium on Security and Privacy (Third deadline)
EAI ITSPWC 2022   EAI International Conference on Intelligent Technologies in Security and Privacy for Wireless Communication
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
PETS 2021   21st Privacy Enhancing Technologies Symposium (Issue 4)
IEEE DSC 2022   The 2022 IEEE Conference on Dependable and Secure Computing
IEEE COINS 2022   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems |
PETS 2021   21st Privacy Enhancing Technologies Symposium (Issue 3)
IEEE CSP--EI Compendex, Scopus 2022   2022 IEEE 6th International Conference on Cryptography, Security and Privacy (CSP 2022)--EI Compendex, Scopus