posted by user: ssr2018 || 2156 views || tracked by 4 users: [display]

SSR 2018 : Security Standardisation Research


When Nov 26, 2018 - Nov 27, 2018
Where Darmstadt, Germany
Submission Deadline Jul 6, 2018
Notification Due Aug 22, 2018
Final Version Due Sep 19, 2018
Categories    standardisation   information security   cryptography   cybersecurity

Call For Papers

Papers offering research contributions to the area of security standardisation are solicited for submission to the SSR 2018 conference. Papers may present theory, applications or practical experience in the field of security standardisation, including, but not necessarily limited to:

- access control
- biometrics
- cloud computing
- critical national infrastructure (CNI) protection
- consistency and comparison of multiple standards
- critiques of standards
- cryptanalysis
- cryptographic protocols
- cryptographic techniques
- evaluation criteria
- formal analysis of standards
- history of standardization
- identity management
- industrial control systems security
- internet security
- interoperability of standards
- intrusion detection
- key management and PKIs
- management of the standardisation process
- mobile security
- network security
- open standards and open source
- payment system security
- privacy
- regional and international standards
- RFID tag security
- risk analysis
- security controls
- security management
- security protocols
- security services
- security tokens
- smart cards
- telecommunications security
- trusted computing
- web security

New this year is that SSR will also accept Systematisation of Knowledge (SoK) papers relating to security standardisation, which integrate experience and previous research, drawing new comprehensive conclusions. SoK papers should evaluate, systematise, and contextualise existing knowledge. They should provide a new viewpoint, offer a comprehensive taxonomy, or cast doubt on long-held beliefs, based on compelling evidence. We also welcome SoK papers that document existing standardisation practices and analyse their weaknesses and strengths.

General Chair:
Marc Fischlin (TU Darmstadt, Germany)

Program Co-Chairs:
Cas Cremers (University of Oxford, UK)
Anja Lehmann (IBM Research – Zurich, Switzerland)

Program Committee:
Steve Babbage, Vodafone, UK
Liqun Chen, University of Surrey, UK
Jean Paul Degabriele, TU Darmstadt, Germany
Antoine Delignat-Lavaud, Microsoft Research, UK
Orr Dunkelman, University of Haifa, Israel
Cedric Fournet, Microsoft Research, UK
Britta Hale, Norwegian University of Science and Technology, Norway
Harry Halpin, INRIA, France
Tibor Jager, Paderborn University, Germany
John Kelsey, NIST, USA
Markulf Kohlweiss, University of Edinburgh, UK
Stephan Krenn, AIT Austrian Institute of Technology, Austria
Xuejia Lai, Shanghai Jiaotong University, China
Tancrede Lepoint, SRI International, USA
Peter Lipp, Graz University of Technology, Austria
Atul Luykx, Visa Research, USA
Catherine Meadows, Naval Research Laboratory, USA
David Naccache, ENS, France
Valtteri Niemi, University of Helsinki, Finland
Kenneth Paterson, Royal Holloway, University of London, UK
Eric Rescorla, Mozilla, USA
Matt Robshaw, Impinj, USA
Phillip Rogaway, University of California, Davis, USA
Mark Ryan, University of Birmingham, UK
Kazue Sako, NEC, Japan
Peter Schwabe, Radboud University, The Netherlands
Tom Shrimpton, University of Florida, USA
Ben Smyth, University of Luxembourg, Luxembourg
Douglas Stebila, McMaster University, Canada
Claire Vishik, Intel Corporation, UK
Michael Ward, MasterCard, UK
William Whyte, Security Innovation, USA

Instructions for Authors:
Submissions must be original and must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any journal or to any other conference or workshop that has published proceedings.

Authors submitting a systematisation of knowledge paper should have a title consisting of “SoK: Title”. This is to ensure that the committee is made aware that the paper is an SoK paper, and so will be reviewed with different criteria.

Submitted papers must be in PDF format and written in English. The submission must be anonymous with no author names, affiliations or obvious references. It should begin with a title, a short abstract, and an introduction. Papers should be at most 16 pages (excluding bibliography and appendices) in the standard LNCS format (see instructions at Reviewers are not obliged to read appendices, so the paper must be self-contained without them.

Papers that do not adhere to these requirements will be rejected without consideration of their merits.

Accepted papers will be presented at the conference and published in Springer’s Lecture Notes in Computer Science (LNCS) series. At least one author of each accepted paper must register for the conference.

Submission Site:
Papers must be submitted using the EasyChair system. The link will be provided on the conference website when the system is open for submissions.

Related Resources

SP 2020   IEEE Symposium on Security and Privacy
SPTM 2020   8th International Conference of Security, Privacy and Trust Management
ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
CRIS 2020   6th International Conference on Cryptography and Information Security
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
ICSS 2019   5th International Conference on Software Security
Cyber Security 2020   IEEE International Conference on Cyber Security and Protection of Digital Services
ICISSP 2020   6th International Conference on Information Systems Security and Privacy
BSP-IoT 2020   Blockchain Security and Privacy for the Internet of Things
IFIP SEC 2020   35th IFIP TC-11 SEC 2020 International Information Security and Privacy Conference