posted by organizer: mstamat || 23178 views || tracked by 65 users: [display]

ESORICS 2016 : European Symposium on Research in Computer Security


Conference Series : European Symposium on Research in Computer Security
When Sep 26, 2016 - Sep 30, 2016
Where Heraklion, Greece
Submission Deadline Apr 22, 2016
Notification Due Jun 27, 2016
Final Version Due Jul 11, 2016
Categories    security   privacy

Call For Papers

Call for Papers: ESORICS 2016
21st European Symposium on Research in Computer Security
Heraklion, Crete -- September 26-30, 2016

WWW: /
Twitter: @sharcs_project, Hashtag: #esorics2016

ESORICS is the annual European research event in Computer Security.
The Symposium started in 1990 and has been held in several European
countries, attracting a wide international audience from both the
academic and industrial communities. Papers offering novel research
contributions in computer security are solicited for submission to the
Symposium. The primary focus is on original, high quality, unpublished
research and implementation experiences. We encourage submissions of
papers discussing industrial research and development.

Important Dates
* Submission due: May 1, 2016 (***EXTENDED***)
* Notification to authors: June 27, 2016
* Camera ready due: July 11, 2016

Topics of Interest
Topics of interest include, but are not limited to:
* access control
* accountability
* ad hoc networks
* anonymity
* applied cryptography
* authentication
* biometrics
* data and computation integrity
* database security
* data protection
* digital content protection
* digital forensics
* distributed systems security
* embedded systems security
* inference control
* information hiding
* identity management
* information flow control
* information security governance and management
* intrusion detection
* formal security methods
* language-based security
* network security
* phishing and spam prevention
* privacy
* privacy preserving data mining
* risk analysis and management
* secure electronic voting
* security architectures
* security economics
* security metrics
* security models
* security and privacy for big data
* security and privacy in cloud scenarios
* security and privacy in complex systems
* security and privacy in content centric networking
* security and privacy in crowdsourcing
* security and privacy in the IoT
* security and privacy in location services
* security and privacy for mobile code
* security and privacy in pervasive / ubiquitous computing
* security and privacy policies
* security and privacy in social networks
* security and privacy in web services
* security and privacy in cyber-physical systems
* security, privacy and resilience in critical infrastructures
* security verification
* software security
* systems security
* trust models and management
* trustworthy user devices
* usable security and privacy
* web security
* wireless security

Paper Submission Guidelines
Submissions must be made through EasyChair at:

Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. The conference proceedings will be
published by Springer in the Lecture Notes in Computer Science series

All submissions should follow the LNCS template from the time they are
submitted. Submitted papers should be at most 16 pages (using 10-point
font), excluding the bibliography and well-marked appendices, and at
most 20 pages total. Committee members are not required to read the
appendices, so the paper should be intelligible without them. All
submissions must be written in English. Submissions are to be made to
the Submission web site. Only pdf files will be accepted.
Submissions are not anonymous.

Submissions not meeting these guidelines risk rejection without
consideration of their merits. Authors of accepted papers must
guarantee that their papers will be presented at the conference.

Papers must be received by the aforementioned dates, 11:59 p.m.
American Samoa time (UTC-11).

Organisation Committee
General Chairs:
* Ioannis Askoxylakis, FORTH, GR
* Sotiris Ioannidis, FORTH, GR

Program Committee Chairs:
* Sokratis Katsikas, Norwegian University of Science and Technology, NO
* Catherine Meadows, Naval Research Laboratory, US

Program Committee:
* Gail-Joon Ahn, Arizona State University, US
* Magnus Almgren, Chalmers University of Technology, SE
* Manos Antonakakis, Georgia Institute of Technology, US
* Alessandro Armando, DIBRIS - University of Genova, IT
* Michael Backes, Saarland University and
Max Planck Institute for Software Systems, DE
* Feng Bao, Security & Privacy Lab, Huawei, CN
* Giampaolo Bella, University of Catania, IT
* Carlo Blundo, Università degli Studi di Salerno, IT
* Rainer Boehme, University of Innsbruck, AT
* Stefan Brunthaler, SBA Researh, DE
* Christian Cachin, IBM Research - Zurich, CH
* Liqun Chen, Hewlett Packard Labs, UK
* Tom Chothia, University of Birmingham, UK
* Sherman Chow, Chinese University of Hong Kong, CN
* Cas Cremers, University of Oxford, UK
* Frédéric Cuppens, Telecom Bretagne, FR
* Nora Cuppens-Boulahia, Telecom Bretagne, FR
* Mads Dam, KTH, SE
* Sabrina De Capitani di Vimercati, Università degli
Studi di Milano, IT
* Hervé Debar, Télécom SudParis, FR
* Roberto di Pietro, University of Rome III, IT
* Josep Domingo-Ferrer, Universitat Rovira i Virgili, ES
* Pavlos Efraimidis, Democritus University of Thrace, GR
* Hannes Federrath, University of Hamburg, DE
* Simone Fischer-Hübner, Karlstad University, SE
* Riccardo Focardi, Università Ca' Foscari, Venezia, IT
* Simon Foley, University College Cork, IE
* Sara Foresti, Universita degli Studi di Milano, IT
* Katrin Franke, Norwegian University of Science & Technology, NO
* Felix Freiling, Friedrich-Alexander-Universität
Erlangen-Nürnberg, DE
* Dieter Gollmann, Hamburg University of Technology, DE
* Dimitris Gritzalis, Athens University of Economics
and Business, GR
* Stefanos Gritzalis, University of the Aegean, GR
* Joshua Guttman, Worcester Polytechnic Institute, US
* Gerhard Hancke, City University of Hong Kong, CN
* Marit Hansen, Independent Center for Privacy Protection
Schleswig-Holstein, DE
* Feng Hao, Newcastle University, UK
* Xinyi Huang, Fujian Normal University, CN
* Michael Huth, Imperial College London, UK
* Aaron D. Jaggard, Naval Research Laboratory, US
* Sushil Jajodia, George Mason University, US
* Vasilios Katos, Bournemouth University, UK
* Dogan Kesdogan, University of Regensburg, DE
* Kwangjo Kim, KAIST, KR
* Steve Kremer, INRIA Nancy - Grand Est, FR
* Ralf Kuesters, University of Trier, DE
* Junzuo Lai, Singapore Management University, SG
* Costas Lambrinoudakis, University of Piraeus, GR
* Peeter Laud, Cybernetica AS, EE
* Adam J. Lee, University of Pittsburgh, US
* Ninghui Li, Purdue University, US
* Yingjiu Li, Singapore Management University, SG
* Antonio Lioy, Politecnico di Torino, IT
* Peng Liu, Pennsylvania State University, US
* Javier Lopez, University of Malaga, ES
* Antonio Maña, University of Malaga, ES
* Pratyusa Manadhata, HP Labs, US
* Luigi Mancini, Universita di Roma La Sapienza, IT
* Heiko Mantel, TU Darmstadt, DE
* Olivier Markowitch, Universite Libre de Bruxelles, BE
* Fabio Martinelli, IIT-CNR, IT
* John Mitchell, Stanford University, US
* Katerina Mitrokotsa, Chalmers University of Technology, SE
* Refik Molva, EURECOM, FR
* Charles Morisset, Newcastle University, UK
* Flemming Nielson, Technical University of Denmark, DK
* Rolf Oppliger, eSECURITY Technologies, CH
* Stefano Paraboschi, Universita di Bergamo, IT
* Dusko Pavlovic, University of Hawaii, US
* Roberto Perdisci, University of Georgia, US
* Olivier Pereira, Universite catholique de Louvain, BE
* Günther Pernul, Universität Regensburg, DE
* Wolter Pieters, TBM-ESS, Delft University of Technology, NL
* Michalis Polychronakis, Stony Brook University, US
* Joachim Posegga, University of Passau, DE
* Kui Ren, State University of New York at Buffalo, US
* Peter Ryan, University of Luxembourg, LU
* Andrei Sabelfeld, Chalmers University of Technology, SE
* Pierangela Samarati, Università degli Studi di Milano, IT
* Ravi Sandhu, University of Texas at San Antonio, US
* Ralf Sasse, ETH Zurich, CH
* Nitesh Saxena, University of Alabama at Birmingham, US
* Andreas Schaad, SAP, DE
* Steve Schneider, University of Surrey, UK
* Joerg Schwenk, Ruhr-Universität Bochum, DE
* Basit Shafiq, Lahore University of Management Sciences, PK
* Ben Smyth, Huawei French Resarch Center, FR
* Krzysztof Szczypiorski, Warsaw University of Technology, PL
* A Min Tjoa, Vienna University of Technology, AT
* Aggeliki Tsohou, Ionian University, GR
* Jaideep Vaidya, Rutgers University, US
* Vijay Varadharajan, Macquarie University, AU
* Luca Viganò, King's College London, UK
* Michael Waidner, Fraunhofer SIT, DE
* Cong Wang, City University of Hong Kong, CN
* Edgar Weippl, SBA Research, AT
* Christos Xenakis, University of Piraeus, GR
* Meng Yu, University of Texas at San Antonio, US
* Jianying Zhou, Institute for Infocomm Research, SG
* Sencun Zhu, Penn State University, US

Publicity Chairs:
* Manolis Stamatogiannakis, Vrije Universiteit Amsterdam, NL
* Youki Kadobayashi, NAIST, JP

ESORICS 2016 is sponsored by:
* Huawei ( / @Huawei)

and Horizon 2020 projects:
* SHARCS ( / @sharcs_project)
* VirtuWind (

Related Resources

EICC 2023   European Interdisciplinary Cybersecurity Conference (EICC 2023)
SI on ATD&IS II 2023   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
ECEL 2023   22nd European Conference on e-Learning
IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA
ECIE 2023   18th European Conference on Innovation and Entrepreneurship
ICCDA--Ei 2023   2023 The 7th International Conference on Computing and Data Analysis (ICCDA 2023)
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
ICCV 2023   International Conference on Computer Vision
ESORICS 2022   27th European Symposium on Research in Computer Security (ESORICS)
ITCA 2023   11th International Conference of Information Technology, Control and Automation