posted by organizer: peeterlaud || 2573 views || tracked by 8 users: [display]

UaESMC 2014 : Workshop on Usable and Efficient Secure Multiparty Computation

FacebookTwitterLinkedInGoogle

Link: http://workshop.usable-security.eu/
 
When Sep 11, 2014 - Sep 11, 2014
Where Wroclaw, Poland
Submission Deadline Jul 14, 2014
Notification Due Aug 7, 2014
Final Version Due Aug 15, 2014
Categories    security   cryptography   privacy
 

Call For Papers

Secure Multiparty Computation (SMC) is a universally applicable privacy-enhancing technology, that can be used whenever untrusted platforms compute on sensitive data. These theoretical possibilities of SMC have been known for a long time, and the last 5-7 years have seen further impressive theoretical advances in this field. These have been accompanied with some practical applications, but these have been small in number and restricted to a couple of fields. With this workshop, we want to bring together researchers of SMC and builders of secure systems, to discuss the secure computation techniques necessary for practical applications. We are interested in practical experience of applying SMC (both positive and negative), privacy-preserving methods of solving particular problems, the integration of SMC with the rest of a secure system and any positive and negative interplay it may have with other functional and non-functional requirements, emerging problems in applications made possible by SMC, etc.

Topics of interest of this workshop include, but are not limited to:

Experience in applying SMC;
SMC and big data;
Design of privacy-preserving algorithms for various problems;
Integration of different privacy-preserving methods in applications;
Game-theoretic problems appearing in privacy-preserving applications.

The workshop solicits extended abstracts (up to three pages in the LNCS format, including the bibliography) of recent or ongoing work. There will be no formal proceedings, but the abstracts of accepted talks will be made available at the workshop. The presentation of recent work that has been published elsewhere is permitted. At least one author of each accepted abstract is required to register to the workshop and present the work.

The organizers of this workshop are planning an edited book on practical aspects of SMC. The authors of the submissions to the workshop may be solicited for chapters in this book.

Related Resources

SOUPS 2017   Symposium on Usable Privacy and Security
SECURWARE 2017   The Eleventh International Conference on Emerging Security Information, Systems and Technologies
NSDI 2017   14th USENIX Symposium on Networked Systems Design and Implementation
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
ICANN 2017   International Conference on Artificial Neural Networks 2017
ICISIP 2017   The 5th IIAE International Conference on Intelligent Systems and Image Processing 2017
SecureEdge 2017   IEEE International Workshop on Secure and Resource-Efficient Edge Computing 2017
MobiSec 2017   Special Issue on Mobile Systems, Mobile Networks and Mobile Cloud: Security, Privacy and Digital Forensics
GECCO 2017   Genetic and Evolutionary Computation Conference
USEC 2017   Usable Security Mini Conference 2017