posted by organizer: peeterlaud || 3062 views || tracked by 8 users: [display]

UaESMC 2014 : Workshop on Usable and Efficient Secure Multiparty Computation

FacebookTwitterLinkedInGoogle

Link: http://workshop.usable-security.eu/
 
When Sep 11, 2014 - Sep 11, 2014
Where Wroclaw, Poland
Submission Deadline Jul 14, 2014
Notification Due Aug 7, 2014
Final Version Due Aug 15, 2014
Categories    security   cryptography   privacy
 

Call For Papers

Secure Multiparty Computation (SMC) is a universally applicable privacy-enhancing technology, that can be used whenever untrusted platforms compute on sensitive data. These theoretical possibilities of SMC have been known for a long time, and the last 5-7 years have seen further impressive theoretical advances in this field. These have been accompanied with some practical applications, but these have been small in number and restricted to a couple of fields. With this workshop, we want to bring together researchers of SMC and builders of secure systems, to discuss the secure computation techniques necessary for practical applications. We are interested in practical experience of applying SMC (both positive and negative), privacy-preserving methods of solving particular problems, the integration of SMC with the rest of a secure system and any positive and negative interplay it may have with other functional and non-functional requirements, emerging problems in applications made possible by SMC, etc.

Topics of interest of this workshop include, but are not limited to:

Experience in applying SMC;
SMC and big data;
Design of privacy-preserving algorithms for various problems;
Integration of different privacy-preserving methods in applications;
Game-theoretic problems appearing in privacy-preserving applications.

The workshop solicits extended abstracts (up to three pages in the LNCS format, including the bibliography) of recent or ongoing work. There will be no formal proceedings, but the abstracts of accepted talks will be made available at the workshop. The presentation of recent work that has been published elsewhere is permitted. At least one author of each accepted abstract is required to register to the workshop and present the work.

The organizers of this workshop are planning an edited book on practical aspects of SMC. The authors of the submissions to the workshop may be solicited for chapters in this book.

Related Resources

CEC 2019   Congress on Evolutionary Computation
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
Scopus-EI-AIAAT 2018   2018 2nd International Conference on Artificial Intelligence Applications and Technologies (AIAAT 2018)
NECO 2018   7th International Conference of Networks and Communications
DASC 2018   16th IEEE International Conference on Dependable, Autonomic and Secure Computing
NMOCT 2018   4th International Conference On Networks, Mobile Communications And Telematics
Scopus-AIAAT 2018   2018 2nd International Conference on Artificial Intelligence Applications and Technologies (AIAAT 2018)
SECITC 2018   11th International Conference on Security for Information Technology and Communications
EC in Scheduling 2019   Call for a WILEY book chapter proposal on Evolutionary Computation in Scheduling
IEEE DSC 2018   The 2018 IEEE Conference on Dependable and Secure Computing