posted by user: zakiahayop || 4980 views || tracked by 5 users: [display]

ProvSec 2013 : The Seventh International Conference on Provable Security (ProvSec 2013)

FacebookTwitterLinkedInGoogle


Conference Series : Provable Security
 
Link: http://ftmk.utem.edu.my/provsec/
 
When Oct 23, 2013 - Oct 25, 2013
Where Melaka, Malaysia
Submission Deadline May 23, 2013
Notification Due Jul 23, 2013
Final Version Due Aug 12, 2013
Categories    security   cryptography
 

Call For Papers

The Seventh International Conference on Provable Security (ProvSec 2013) will be held in Melaka, Malaysia on 23-25 October 2013 http://ftmk.utem.edu.my/provsec/. It will be organized by Universiti Teknikal Malaysia Melaka.
Provable security is an important research area in modern cryptography. Cryptographic primitives or protocols without a rigorous proof cannot be regarded as secure even in practice. In fact, there are many schemes that were originally thought as secure but eventually broken, which clearly indicates the need of formal security assurance. With provable security, we are confident in using cryptographic schemes and protocols in various real-world applications. Meanwhile, schemes with provable security sometimes give only theoretical feasibility rather than a practical construction, and correctness of the proofs may be difficult to verify. ProvSec conference thus provides a platform for researchers, scholars and practitioners to exchange new ideas for solving these problems in the provable security area.
The previous ProvSec conference series were successfully held in Wollongong, Australia (2007), Shanghai, China (2008), Guangzhou, China (2009), Malacca, Malaysia (2010), Xi’an, China (2011), and Chengdu, China (2012). The conference proceedings will be published by Springer-Verlag in the Lecture Notes in Computer Science series.
Conference Topics: Topics include all aspects of provable security for cryptographic primitives or protocols, and include but are not limited to the following areas:
· Cryptographic primitives
· Digital signatures
· Formal security model
· Lattice-based security reductions
· Pairing-based provably secure cryptography
· Privacy and anonymity technologies
· Provable secure block ciphers and hash functions
· Secure cryptographic protocols and applications
· Security notions, approaches, and paradigms
· Steganography and steganalysis



Instructions for authors: Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel for consideration of any other journal, conference/workshop with proceedings. The submission should begin with a title followed by a short abstract and keywords. Submissions should have at most 12 pages excluding the bibliography and appendices, and at most 20 pages in total, using at least 11-point fonts and with reasonable margins. All submissions should be anonymous. Authors of accepted papers must guarantee that at least one of the authors will attend the conference and present their paper. Submissions will be received electronically via Easychair.

Important Dates:
Paper submission deadline: 23 May 2013
Notification of acceptance: 23 July 2013
Proceedings version deadline: 12 August 2013
Conference Dates: 23 - 25 October 2013

Related Resources

IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
IEEE COINS 2022   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems |
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
SI on ATD&IS 2021   Special Issue on Advanced Technologies in Data and Information Security, Applied Sciences, MDPI
MoWiN 2022   11th International Conference on Mobile & Wireless Networks
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
CSEIJ 2021   Computer Science & Engineering: An International Journal
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
EMSA 2022   11th International Conference on Embedded Systems and Applications