posted by user: sadiaz || 2380 views || tracked by 12 users: [display]

PETS 2015 : Privacy Enhancing Technologies Symposium


Conference Series : Privacy Enhancing Technologies
When Jun 30, 2015 - Jul 2, 2015
Where Drexel University, Philadelphia, PA, USA
Submission Deadline Nov 22, 2014
Notification Due Jan 15, 2015
Final Version Due Feb 15, 2015

Call For Papers

PETS will now have 5 deadlines a year; submit whenever you feel ready! The first deadline is coming soon: Nov 22, 2014. The next is Feb 15, 2015.

Read the CFP below for more details on our new hybrid conference/journal model (based on the PVLDB model), which includes the option to resubmit with minor/major revisions to a subsequent deadline.

We look forward to your submissions!

15th Privacy Enhancing Technologies Symposium (PETS)
Drexel University, Philadelphia, PA, USA
June 30 - July 2, 2015

The annual Privacy Enhancing Technologies Symposium (PETS) brings together privacy and anonymity experts from around the world to discuss recent advances and new perspectives. PETS addresses the design and realization of privacy services for the Internet and other data systems and communication networks.

PETS seeks paper and panel submissions for its 15th event to be held in Drexel University, Philadelphia, PA, USA on June 30 - July 2, 2014. Papers should present novel practical and/or theoretical research into the design, analysis, experimentation, or fielding of privacy-enhancing technologies. While PETS has traditionally been home to research on anonymity systems and privacy-oriented cryptography, we strongly encourage submissions in a number of both well-established and some emerging privacy-related topics.

*** New starting this year ***:

Papers will undergo a journal-style reviewing process and be published in the Proceedings on Privacy Enhancing Technologies (PoPETs). PoPETs, a scholarly journal for timely research papers on privacy, has been established as a way to improve reviewing and publication quality while retaining the highly successful PETS community event. PoPETs will be published by De Gruyter Open (, the world's second largest publisher of Open Access academic content, and part of the De Gruyter group (, which has over 260 years of publishing history.

Authors can submit papers to one of several submission deadlines during the year. Papers are provided with major/minor revision decisions on a predictable schedule, where we endeavor to assign the same reviewers to major revisions. Authors can address the concerns of reviewers in their revision and rebut reviewer comments before a final decision on acceptance is made. Papers accepted for publication by May 15th will be presented at that year's symposium. Note that accepted papers must be presented at PETS.

Please visit for more information and submission instructions.
Authors are encouraged to view our FAQ about the submission process:

*** Important Dates for PETS 2015 ***

Issue 1:
Paper submission deadline: Nov 22, 2014 (firm)
Author notification: Jan 15, 2014
Camera-ready deadline for accepted papers and minor revisions (if accepted by the shepherd): Feb 15, 2014
Major revisions deadline: Submit to either of next two deadlines (February and April 2015) up to 2 weeks late, but register abstract by paper submission deadline.

Issue 2:
Paper submission deadline: Feb 15, 2015 (firm)
Author notification: April 15, 2015
Camera-ready deadline for accepted papers and minor revisions (if accepted by the shepherd): May 15, 2015
Major revisions deadline: Submit to the next deadline (August 2015) up to 2 weeks late, but register abstract by paper submission deadline. (Note that only the August 2015 deadline is offered because the June 2015 deadline is skipped in lieu of planning for the PETS event. If accepted, papers will appear at PETS 2016.)

Suggested topics include but are not restricted to:

Behavioural targeting
Building and deploying privacy-enhancing systems
Crowdsourcing for privacy
Cryptographic tools for privacy
Data protection technologies
Differential privacy
Economics of privacy and game-theoretical approaches to privacy
Forensics and privacy
Human factors, usability and user-centered design for PETs
Information leakage, data correlation and generic attacks to privacy
Interdisciplinary research connecting privacy to economics, law, ethnography, psychology, medicine, biotechnology
Location and mobility privacy
Measuring and quantifying privacy
Obfuscation-based privacy
Policy languages and tools for privacy
Privacy and human rights
Privacy in ubiquitous computing and mobile devices
Privacy in cloud and big-data applications
Privacy in social networks and microblogging systems
Privacy-enhanced access control, authentication, and identity management
Profiling and data mining
Reliability, robustness, and abuse prevention in privacy systems
Systems for anonymous communications and censorship resistance
Traffic analysis
Transparency enhancing tools

General Chair (
Rachel Greenstadt, Drexel University

Program Chairs/Co-Editors-in-Chief (
Apu Kapadia, Indiana University Bloomington
Steven Murdoch, University College London

Program Committee/Editorial Board:
Sadia Afroz, UC Berkeley
N. Asokan, Aalto University and University of Helsinki
Adam Aviv, United States Naval Academy
Erman Ayday, Indiana University Purdue University, Indianapolis (IUPUI)
Lujo Bauer, Carnegie Mellon University
Marina Blanton, University of Notre Dame
Joseph Bonneau, Princeton University
Nikita Borisov, University of Illinois at Urbana-Champaign
Kevin Butler, University of Florida
Kelly Caine, Clemson University
Jan Camenisch, IBM Research - Zurich
Srdjan Capkun, ETH Zurich
Claude Castelluccia, INRIA Rhone-Alpes
Kostas Chatzikokolakis, Lix Ecole Polytechnique
Graham Cormode, University of Warwick
Lorrie Cranor, Carnegie Mellon University
Anupam Datta, Carnegie Mellon University
Roberto Di Pietro, Bell Labs France
Claudia Diaz, KU Leuven
Serge Egelman, UC Berkeley
William Enck, NC State University
Zekeriya Erkin, TU Delft
Adrienne Porter Felt, Google
Simone Fischer-Hübner, Karlstad University
Carl Gunter, University of Illinois at Urbana-Champaign
Ryan Henry, Indiana University Bloomington
Amir Herzberg, Bar Ilan University
Raquel Hill, Indiana University Bloomington
Nick Hopper, University of Minnesota
Amir Houmansadr, University of Massachusetts, Amherst
Rob Jansen, U.S. Naval Research Laboratory
Mohamed-Ali (Dali) Kaafar, NICTA Australia
Stefan Katzenbeisser, TU Darmstadt
Negar Kiyavash, University of Illinois at Urbana-Champaign
Markulf Kohlweiss, Microsoft Research
Yoshi Kohno, University of Washington
Adam J. Lee, University of Pittsburgh
Wenke Lee, Georgia Institute of Technology
Brian Levine, University of Massachusetts, Amherst
Marc Liberatore, University of Massachusetts, Amherst
Anna Lysyanskaya, Brown University
Ashwin Machanavajjhala, Duke University
Z. Morley Mao, University of Michigan
Nick Mathewson, The Tor Project
Prateek Mittal, Princeton University
Steven Myers, Indiana University Bloomington
Helen Nissenbaum, New York University
Claudio Orlandi, Aarhus University
Kenny Paterson, Royal Holloway, University of London
Michael Reiter, UNC Chapel Hill
Thomas Ristenpart, University of Wisconsin-Madison
Reihaneh Safavi-Naini, University of Calgary
Micah Sherr, Georgetown University
Reza Shokri, ETH Zurich
Radu Sion, Stony Brook University
Adam Smith, Pennsylvania State University
Jessica Staddon, Google
Paul Syverson, U.S. Naval Research Laboratory
Patrick Traynor, University of Florida
Carmela Troncoso, Gradiant
Eugene Vasserman, Kansas State University
Yang Wang, Syracuse University
Matthew Wright, UT Arlington

Publicity Chair (
Sadia Afroz, UC Berkeley

HotPETs Chairs (
Kelly Caine, Clemson University
Michael Brennan, SecondMuse
Aaron Johnson, U.S. Naval Research Laboratory

Submission Guidelines
Papers to be submitted to the PET Symposium must be at most 10 pages excluding bibliography and appendices and 15 pages total in double-column ACM format ( PC members are not required to read the appendices, which should only be used to support evidence of the submission's technical validity, e.g., for detailed security proofs. Also, all papers must be anonymized (more information below). Papers not following these instructions risk being rejected without consideration of their merits.

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings.

The paper should start with the title and an abstract. The introduction should give some background and summarize the contributions of the paper at a level appropriate for a non-specialist reader.

Anonymization of Submissions
All submitted papers will be judged based on their quality and relevance through double-blind reviewing, where the identities of the authors are withheld from the reviewers. As an author, you are required to make a good-faith effort to preserve the anonymity of your submission, while at the same time allowing the reader to fully grasp the context of related past work, including your own. Minimally, please take the following steps when preparing your submission:

Remove the names and affiliations of authors from the title page.
Remove acknowledgment of identifying names and funding sources.
Use care in referring to related work, particularly your own. Do not omit references to provide anonymity, as this leaves the reviewer unable to grasp the context. Instead, reference your past work in the third person, just as you would any other piece of related work by another author.

Papers describing experiments with users or user data (e.g., network traffic, passwords, social network information), should follow the basic principles of ethical research, e.g., beneficence (maximizing the benefits to an individual or to society while minimizing harm to the individual), minimal risk (appropriateness of the risk versus benefit ratio), voluntary consent, respect for privacy, and limited deception. Authors are encouraged to include a subsection on Ethical Principles if human subjects research is conducted, and such a discussion may be required if deemed necessary during the review process. Authors are encouraged to contact PC chairs before submitting to clarify any doubts.

Accepted papers will be published as an Open Access Journal by De Gruyter Open, the world's second largest publisher of Open Access academic content, and part of the De Gruyter group, which has over 260 years of publishing history. Authors retain copyright of their work. Papers will be published under an open-access policy using a Creative Commons Attribution-NonCommercial-NoDerivs ( license.

Best Student Paper Award
The Andreas Pftzmann PETS 2015 Best Student Paper Award will be selected at PETS 2015. Papers written solely or primarily by a student who is presenting the work at PETS 2015 are eligible for the award.

Papers will need to be submitted via the PETS 2015 submission server. Details will be published on the PETS 2015 website closer to the deadline.

As with the last several years, part of the symposium will be devoted to HotPETs - the "hottest," most exciting research ideas still in a formative state. Further information will be published on the PETS 2015 website soon.

Panel Submissions
We also invite proposals of up to 2 pages for panel discussions or other relevant presentations. In your proposal, (1) describe the nature of the presentation and why it is appropriate to the symposium, (2) suggest a duration for the presentation (ideally between 45 and 90 minutes), and (3) suggest some possible presenters.

Submit your proposal in the same manner as a PoPETs paper by the Feb 15 deadline. (All panel proposals received by the Feb 15 deadline will receive full consideration for that year's PETS.) Please begin your panel title with "Panel Proposal:". The program committee will consider panel proposals along with other symposium events and will respond by the paper decision date with an indication of its interest in scheduling the event.

Related Resources

PETS-Fourth-Issue 2017   17th Privacy Enhancing Technologies Symposium
PETS-Third-Issue 2017   17th Privacy Enhancing Technologies Symposium
SECURWARE 2017   The Eleventh International Conference on Emerging Security Information, Systems and Technologies
ACISP 2017   Australasian Conference on Information Security and Privacy
IUI 2017   Intelligent User Interfaces
TrustCom 2017   16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
SOUPS 2017   Symposium on Usable Privacy and Security
DBSec 2017   31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy
INSERT 2017   1st International Conference on Security, Privacy, and Trust (INSERT'17)
USENIX Security 2017   USENIX Security '17