posted by user: ssr2018 || 3041 views || tracked by 4 users: [display]

SSR 2018 : Security Standardisation Research


When Nov 26, 2018 - Nov 27, 2018
Where Darmstadt, Germany
Submission Deadline Jul 6, 2018
Notification Due Aug 22, 2018
Final Version Due Sep 19, 2018
Categories    standardisation   information security   cryptography   cybersecurity

Call For Papers

Papers offering research contributions to the area of security standardisation are solicited for submission to the SSR 2018 conference. Papers may present theory, applications or practical experience in the field of security standardisation, including, but not necessarily limited to:

- access control
- biometrics
- cloud computing
- critical national infrastructure (CNI) protection
- consistency and comparison of multiple standards
- critiques of standards
- cryptanalysis
- cryptographic protocols
- cryptographic techniques
- evaluation criteria
- formal analysis of standards
- history of standardization
- identity management
- industrial control systems security
- internet security
- interoperability of standards
- intrusion detection
- key management and PKIs
- management of the standardisation process
- mobile security
- network security
- open standards and open source
- payment system security
- privacy
- regional and international standards
- RFID tag security
- risk analysis
- security controls
- security management
- security protocols
- security services
- security tokens
- smart cards
- telecommunications security
- trusted computing
- web security

New this year is that SSR will also accept Systematisation of Knowledge (SoK) papers relating to security standardisation, which integrate experience and previous research, drawing new comprehensive conclusions. SoK papers should evaluate, systematise, and contextualise existing knowledge. They should provide a new viewpoint, offer a comprehensive taxonomy, or cast doubt on long-held beliefs, based on compelling evidence. We also welcome SoK papers that document existing standardisation practices and analyse their weaknesses and strengths.

General Chair:
Marc Fischlin (TU Darmstadt, Germany)

Program Co-Chairs:
Cas Cremers (University of Oxford, UK)
Anja Lehmann (IBM Research – Zurich, Switzerland)

Program Committee:
Steve Babbage, Vodafone, UK
Liqun Chen, University of Surrey, UK
Jean Paul Degabriele, TU Darmstadt, Germany
Antoine Delignat-Lavaud, Microsoft Research, UK
Orr Dunkelman, University of Haifa, Israel
Cedric Fournet, Microsoft Research, UK
Britta Hale, Norwegian University of Science and Technology, Norway
Harry Halpin, INRIA, France
Tibor Jager, Paderborn University, Germany
John Kelsey, NIST, USA
Markulf Kohlweiss, University of Edinburgh, UK
Stephan Krenn, AIT Austrian Institute of Technology, Austria
Xuejia Lai, Shanghai Jiaotong University, China
Tancrede Lepoint, SRI International, USA
Peter Lipp, Graz University of Technology, Austria
Atul Luykx, Visa Research, USA
Catherine Meadows, Naval Research Laboratory, USA
David Naccache, ENS, France
Valtteri Niemi, University of Helsinki, Finland
Kenneth Paterson, Royal Holloway, University of London, UK
Eric Rescorla, Mozilla, USA
Matt Robshaw, Impinj, USA
Phillip Rogaway, University of California, Davis, USA
Mark Ryan, University of Birmingham, UK
Kazue Sako, NEC, Japan
Peter Schwabe, Radboud University, The Netherlands
Tom Shrimpton, University of Florida, USA
Ben Smyth, University of Luxembourg, Luxembourg
Douglas Stebila, McMaster University, Canada
Claire Vishik, Intel Corporation, UK
Michael Ward, MasterCard, UK
William Whyte, Security Innovation, USA

Instructions for Authors:
Submissions must be original and must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any journal or to any other conference or workshop that has published proceedings.

Authors submitting a systematisation of knowledge paper should have a title consisting of “SoK: Title”. This is to ensure that the committee is made aware that the paper is an SoK paper, and so will be reviewed with different criteria.

Submitted papers must be in PDF format and written in English. The submission must be anonymous with no author names, affiliations or obvious references. It should begin with a title, a short abstract, and an introduction. Papers should be at most 16 pages (excluding bibliography and appendices) in the standard LNCS format (see instructions at Reviewers are not obliged to read appendices, so the paper must be self-contained without them.

Papers that do not adhere to these requirements will be rejected without consideration of their merits.

Accepted papers will be presented at the conference and published in Springer’s Lecture Notes in Computer Science (LNCS) series. At least one author of each accepted paper must register for the conference.

Submission Site:
Papers must be submitted using the EasyChair system. The link will be provided on the conference website when the system is open for submissions.

Related Resources

S&P 2022   IEEE Symposium on Security and Privacy (Third deadline)
ICISSP 2022   8th International Conference on Information Systems Security and Privacy
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
SIGIR 2022   The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval
CyberHunt 2021   IEEE Workshop on Cyber Threat Intelligence and Hunting with AI
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
NeTIOT 2021   2nd International Conference on Networks & IOT
ASIACCS 2022   ACM Symposium on Information, Computer and Communications Security
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)
USENIX 2022   USENIX Security 2022 : 31st USENIX Security Symposium (Winter Deadline)