posted by user: jkawamoto || 3737 views || tracked by 8 users: [display]

ProvSec 2014 : The Eighth International Conference on Provable Security

FacebookTwitterLinkedInGoogle


Conference Series : Provable Security
 
Link: http://home.ie.cuhk.edu.hk/~provsec14/index.html
 
When Oct 9, 2014 - Oct 10, 2014
Where Hong Kong
Submission Deadline Jun 20, 2014
Notification Due Jul 23, 2014
Final Version Due Aug 12, 2014
Categories    security
 

Call For Papers

The Eighth International Conference on Provable Security (ProvSec 2014) will be held in Hong Kong on 9-10
October 2014. It will be organized by University of Hong Kong.
Provable security is an important research area in modern cryptography. Cryptographic primitives or protocols
without a rigorous proof cannot be regarded as secure in practice. In fact, there are many schemes that were originally
thought as secure but eventually broken, which clearly indicates the need of formal security assurance. With provable
security, we are confident in using cryptographic schemes and protocols in various real-world applications.
Meanwhile, schemes with provable security sometimes give only theoretical feasibility rather than a practical
construction, and correctness of the proofs may be difficult to verify. ProvSec conference thus provides a platform for
researchers, scholars and practitioners to exchange new ideas for solving these problems in the provable security area.
The previous ProvSec conference series were successfully held in Wollongong, Australia (2007), Shanghai, China
(2008), Guangzhou, China (2009), Malacca, Malaysia (2010), Xi’an, China (2011), Chengdu, China (2012) and
Malacca, Malaysia (2013). The conference proceedings will be published by Springer-Verlag in the Lecture Notes in
Computer Science series.
Conference Topics: All aspects of provable security for cryptographic primitives or protocols, include but are not
limited to the following areas:
• Asymmetric provably secure cryptography
• Cryptographic primitives
• Lattice-based security reductions
• Leakage-resilient cryptography
• Pairing-based provably secure cryptography
• Privacy and anonymity technologies
• Provable secure block ciphers and hash functions
• Secure cryptographic protocols and applications
• Security notions, approaches, and paradigms
• Steganography and steganalysis

Special issues:
Journal: Security and Communication Networks (SCN)
Topic: Special Issue on “Provably Secure Cryptographic Solutions for Wireless Networks”

We are further discussing with other journals for special issues of selected papers published in ProvSec (after
significant extension). More details will be announced later.
Important Dates:
Conference date: 9-10 October 2014
Paper submission deadline: 20 June 2014
Notification of acceptance: 23 July 2014
Proceedings version deadline: 12 August 2014

Conference Organization:
General Co-Chairs:
Lucas C.K. Hui (University of Hong Kong, Hong Kong) hui@cs.hku.hk
S.M. Yiu (University of Hong Kong, Hong Kong) smyiu@cs.hku.hk
Program Co-Chairs:
Sherman S. M. Chow (Chinese University of Hong Kong, Hong Kong) smchow@ie.cuhk.edu.hk
Joseph K. Liu (Institute for Infocomm Research, Singapore) ksliu@i2r.a-star.edu.sg
Program Committee:
Elena Andreeva (KU Leuven, Belgium)
Man-Ho Au (University of Wollongong, Australia)
Reza Azarderakhsh (Rochester Institute of Technology, US)
Joonsang Baek (Khalifa University of Science Technology and Research, UAE)
Paulo S. L. M. Barreto (University of São Paulo, Brazil)
Olivier Blazy (RUHR, Germany)
Andrej Bogdanov (Chinese University of Hong Kong, Hong Kong)
Sanjit Chatterjee (IISC, India)
Liqun Chen (HP Labs, UK)
Seung Geoi Choi (United States Naval Academy, US)
Georg Fuchsbauer (IST, Austria)
David Galindo (LORIA-CNRS, France)
Sanjam Garg (IBM Research, US)
Matthew Henricksen (Institute for Infocomm Research, Singapore)
Xinyi Huang (Fujian Normal University, China)
Stanislaw Jarecki (University of California at Irvine, US)
Miroslaw Kutylowski (Wroclaw University of Technology, Poland
Jin Li (Guangzhou University, China)
Shengli Liu (Shanghai Jiao Tong University, China)
Mark Manulis (University of Surrey, UK)
Sarah Meiklejohn (University of Calirofrnia at San Diego, US)
Kazuhiko Minematsu (NEC, Japan)
Atsuko Miyaji (JAIST, Japan)
Alptekin Küpçü (Koç University, Turkey)
Reza Reyhanitabar (EPFL, Switzerland)
Reihaneh Safavi-Naini (University of Calgary, Canada)
Alice Silverberg (University of California at Irvine, US)
Willy Susilo (University of Wollongong, Australia)
Koutarou Suzuki (NTT, Japan)
Tsuyoshi Takagi (Kyushu University, Japan)
Berkant Ustaoğlu (İzmir Institute of Technology)
Cong Wang (City University of Hong Kong, Hong Kong)
Duncan Wong (City University of Hong Kong, Hong Kong)
Wun-She Yap (Universiti Tunku Abdul Rahman, Malaysia)
Zongyang Zhang (AIST, Japan)

Related Resources

SciSec 2018   The 1st International Conference on Science of Cyber Security
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
PST 2018   The Sixteen International Conference on Privacy, Security and Trust (PST)
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
SECRYPT 2018   15th International Conference on Security and Cryptography
USENIX-Security 2018   27th USENIX Security Symposium
DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications
ESSoS 2018   International Symposium on Engineering Secure Software and Systems
ACII 2018   Advanced Computational Intelligence: An International Journal
ASYNC 2018   24st IEEE International Symposium on Asynchronous Circuits and Systems