posted by organizer: comqjam || 2703 views || tracked by 3 users: [display]

SPW 2014 : Twenty-second International Workshop on Security Protocols


When Mar 19, 2014 - Mar 21, 2014
Where Cambridge, UK
Submission Deadline Jan 7, 2014
Notification Due Jan 31, 2014
Categories    computer security

Call For Papers

The twenty-second International Workshop on Security Protocols will take place from Wednesday March 19th to Friday March 21st, 2014 at Sidney Sussex College, Cambridge, England.

As with previous years, attendance at the International Workshop on Security Protocols is by invitation only, and in order to be invited you must submit a position paper. You are therefore encouraged to consider submitting such a paper!

The theme of this year’s workshop is "Collaborating with the Enemy".

Now that all our paranoid dreams of the last twenty years have come true, what shall we wish for next?

It's clear that "attackers'' now control so much of our infrastructure that we cannot achieve any serious distributed service without their cooperation.

Conversely, from their point of view, the same could become the case, but with us cast as the spoilsports.

Is this a zero-sum game, resulting in a straightforward shoving match, or are there security innovations that both parties would have a positive incentive to support?

Additional details of costs and benefits of attending are at:

To be considered for invitation, you must send a first draft of a position paper to James Malcolm (, telephone: +44-1707-284-310) by the deadline noted above.

Thank you!

Bruce Christianson
Professor of Informatics
University of Hertfordshire

Related Resources

FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ACM CCS 2018   25th ACM Conference on Computer and Communications Security (ACM CCS)
TSD 2018   Twenty-first International Conference on TEXT, SPEECH and DIALOGUE
ACIT 2018   International Conference Advanced Computer Information Technologies
CP 2018   Twenty-Fourth Conference on Principles and Practice of Constraint Programming
WOOT 2018   12th USENIX Workshop on Offensive Technologies
ICNP 2018   IEEE International Conference on Network Protocols
CloudCom 2018   The 10th IEEE International Conference on Cloud Computing Technology and Science
DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications
IJIS-IoTSec 2018   Springer IJIS Special Issue on IoT Security and Privacy