posted by user: jkawamoto || 5067 views || tracked by 8 users: [display]

ProvSec 2014 : The Eighth International Conference on Provable Security


Conference Series : Provable Security
When Oct 9, 2014 - Oct 10, 2014
Where Hong Kong
Submission Deadline Jun 20, 2014
Notification Due Jul 23, 2014
Final Version Due Aug 12, 2014
Categories    security

Call For Papers

The Eighth International Conference on Provable Security (ProvSec 2014) will be held in Hong Kong on 9-10
October 2014. It will be organized by University of Hong Kong.
Provable security is an important research area in modern cryptography. Cryptographic primitives or protocols
without a rigorous proof cannot be regarded as secure in practice. In fact, there are many schemes that were originally
thought as secure but eventually broken, which clearly indicates the need of formal security assurance. With provable
security, we are confident in using cryptographic schemes and protocols in various real-world applications.
Meanwhile, schemes with provable security sometimes give only theoretical feasibility rather than a practical
construction, and correctness of the proofs may be difficult to verify. ProvSec conference thus provides a platform for
researchers, scholars and practitioners to exchange new ideas for solving these problems in the provable security area.
The previous ProvSec conference series were successfully held in Wollongong, Australia (2007), Shanghai, China
(2008), Guangzhou, China (2009), Malacca, Malaysia (2010), Xi’an, China (2011), Chengdu, China (2012) and
Malacca, Malaysia (2013). The conference proceedings will be published by Springer-Verlag in the Lecture Notes in
Computer Science series.
Conference Topics: All aspects of provable security for cryptographic primitives or protocols, include but are not
limited to the following areas:
• Asymmetric provably secure cryptography
• Cryptographic primitives
• Lattice-based security reductions
• Leakage-resilient cryptography
• Pairing-based provably secure cryptography
• Privacy and anonymity technologies
• Provable secure block ciphers and hash functions
• Secure cryptographic protocols and applications
• Security notions, approaches, and paradigms
• Steganography and steganalysis

Special issues:
Journal: Security and Communication Networks (SCN)
Topic: Special Issue on “Provably Secure Cryptographic Solutions for Wireless Networks”

We are further discussing with other journals for special issues of selected papers published in ProvSec (after
significant extension). More details will be announced later.
Important Dates:
Conference date: 9-10 October 2014
Paper submission deadline: 20 June 2014
Notification of acceptance: 23 July 2014
Proceedings version deadline: 12 August 2014

Conference Organization:
General Co-Chairs:
Lucas C.K. Hui (University of Hong Kong, Hong Kong)
S.M. Yiu (University of Hong Kong, Hong Kong)
Program Co-Chairs:
Sherman S. M. Chow (Chinese University of Hong Kong, Hong Kong)
Joseph K. Liu (Institute for Infocomm Research, Singapore)
Program Committee:
Elena Andreeva (KU Leuven, Belgium)
Man-Ho Au (University of Wollongong, Australia)
Reza Azarderakhsh (Rochester Institute of Technology, US)
Joonsang Baek (Khalifa University of Science Technology and Research, UAE)
Paulo S. L. M. Barreto (University of São Paulo, Brazil)
Olivier Blazy (RUHR, Germany)
Andrej Bogdanov (Chinese University of Hong Kong, Hong Kong)
Sanjit Chatterjee (IISC, India)
Liqun Chen (HP Labs, UK)
Seung Geoi Choi (United States Naval Academy, US)
Georg Fuchsbauer (IST, Austria)
David Galindo (LORIA-CNRS, France)
Sanjam Garg (IBM Research, US)
Matthew Henricksen (Institute for Infocomm Research, Singapore)
Xinyi Huang (Fujian Normal University, China)
Stanislaw Jarecki (University of California at Irvine, US)
Miroslaw Kutylowski (Wroclaw University of Technology, Poland
Jin Li (Guangzhou University, China)
Shengli Liu (Shanghai Jiao Tong University, China)
Mark Manulis (University of Surrey, UK)
Sarah Meiklejohn (University of Calirofrnia at San Diego, US)
Kazuhiko Minematsu (NEC, Japan)
Atsuko Miyaji (JAIST, Japan)
Alptekin Küpçü (Koç University, Turkey)
Reza Reyhanitabar (EPFL, Switzerland)
Reihaneh Safavi-Naini (University of Calgary, Canada)
Alice Silverberg (University of California at Irvine, US)
Willy Susilo (University of Wollongong, Australia)
Koutarou Suzuki (NTT, Japan)
Tsuyoshi Takagi (Kyushu University, Japan)
Berkant Ustaoğlu (İzmir Institute of Technology)
Cong Wang (City University of Hong Kong, Hong Kong)
Duncan Wong (City University of Hong Kong, Hong Kong)
Wun-She Yap (Universiti Tunku Abdul Rahman, Malaysia)
Zongyang Zhang (AIST, Japan)

Related Resources

IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
IEEE COINS 2022   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems |
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
MoWiN 2022   11th International Conference on Mobile & Wireless Networks
DLIS 2022   Deep Learning for IoT Security - Frontiers in Big Data Journal
USENIX 2022   USENIX Security 2022 : 31st USENIX Security Symposium (Winter Deadline)
SI on ATD&IS 2021   Special Issue on Advanced Technologies in Data and Information Security, Applied Sciences, MDPI
EMSA 2022   11th International Conference on Embedded Systems and Applications
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)