posted by organizer: peeterlaud || 2735 views || tracked by 8 users: [display]

UaESMC 2014 : Workshop on Usable and Efficient Secure Multiparty Computation

FacebookTwitterLinkedInGoogle

Link: http://workshop.usable-security.eu/
 
When Sep 11, 2014 - Sep 11, 2014
Where Wroclaw, Poland
Submission Deadline Jul 14, 2014
Notification Due Aug 7, 2014
Final Version Due Aug 15, 2014
Categories    security   cryptography   privacy
 

Call For Papers

Secure Multiparty Computation (SMC) is a universally applicable privacy-enhancing technology, that can be used whenever untrusted platforms compute on sensitive data. These theoretical possibilities of SMC have been known for a long time, and the last 5-7 years have seen further impressive theoretical advances in this field. These have been accompanied with some practical applications, but these have been small in number and restricted to a couple of fields. With this workshop, we want to bring together researchers of SMC and builders of secure systems, to discuss the secure computation techniques necessary for practical applications. We are interested in practical experience of applying SMC (both positive and negative), privacy-preserving methods of solving particular problems, the integration of SMC with the rest of a secure system and any positive and negative interplay it may have with other functional and non-functional requirements, emerging problems in applications made possible by SMC, etc.

Topics of interest of this workshop include, but are not limited to:

Experience in applying SMC;
SMC and big data;
Design of privacy-preserving algorithms for various problems;
Integration of different privacy-preserving methods in applications;
Game-theoretic problems appearing in privacy-preserving applications.

The workshop solicits extended abstracts (up to three pages in the LNCS format, including the bibliography) of recent or ongoing work. There will be no formal proceedings, but the abstracts of accepted talks will be made available at the workshop. The presentation of recent work that has been published elsewhere is permitted. At least one author of each accepted abstract is required to register to the workshop and present the work.

The organizers of this workshop are planning an edited book on practical aspects of SMC. The authors of the submissions to the workshop may be solicited for chapters in this book.

Related Resources

SOUPS 2017   Symposium on Usable Privacy and Security
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
NSDI 2017   14th USENIX Symposium on Networked Systems Design and Implementation
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
GECCO 2018   Genetic and Evolutionary Computation Conference
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
WCCI 2018   World Congress on Computational Intelligence
IJMSA 2017   International Journal of Modeling, Simulation and Applications
SecureEdge 2017   IEEE International Workshop on Secure and Resource-Efficient Edge Computing 2017
CEC 2018   Congress on Evolutionary Computation