[e-lang] [Fwd: [p2p-hackers] Reminder: CFP: 10th European Symposium on Research in Computer Security]

Mark S. Miller markm at cs.jhu.edu
Mon Mar 14 11:39:44 EST 2005

-------- Original Message --------
Subject: 	[p2p-hackers] Reminder: CFP: 10th European Symposium on
Research in Computer Security
Date: 	Mon, 14 Mar 2005 17:39:54 +0100
From: 	Claudio Agostino Ardagna <ardagna at dti.unimi.it>
Reply-To: 	Peer-to-peer development. <p2p-hackers at zgp.org>
To: 	<p2p-hackers at zgp.org>

[Apologies if you receive multiple copies of this message]

Milan, Italy - September 14-16, 2005


                  SUBMISSION OF PAPERS: MARCH 25, 2005

Papers offering novel research contributions in any aspect of computer
security are solicited for submission to the Tenth European Symposium
on Research in Computer Security (ESORICS 2005). Organized in a series
of European countries, ESORICS is confirmed as the European research
event in computer security. The symposium started in 1990 and has been
held on alternate years in different European countries and attracts
an international audience from both the academic and industrial
communities. From 2002 it has been held yearly. The Symposium has
established itself as one of the premiere, international gatherings on
information assurance. Papers may present theory, technique,
applications, or practical experience on topics including:

- access control
- accountability
- anonymity
- applied cryptography
- authentication
- covert channels
- cryptographic protocols
- cybercrime
- data and application security
- data integrity
- denial of service attacks
- dependability
- digital right managament
- firewalls
- formal methods in security
- identity management
- inference control
- information dissemination control
- information flow control
- information warfare
- intellectual property protection
- intrusion tolerance
- language-based security
- network security
- non-interference
- peer-to-peer security
- privacy-enhancing technology
- pseudonymity
- secure electronic commerce
- security administration
- security as quality of service
- security evaluation
- security management
- security models
- security requirements engineering
- security verification
- smartcards
- steganography
- subliminal channels
- survivability
- system security
- transaction management
- trust models and trust management policies
- trustworthy user devices

The primary focus is on high-quality original unpublished research,
case studies and implementation experiences. We encourage submissions
of papers discussing industrial research and development. Proceedings
will be published by Springer-Verlag in the Lecture Notes in Computer
Science series.

Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. Papers should be at most 15 pages
excluding the bibliography and well-marked appendices (using 11-point
font), and at most 20 pages total. Committee members are not required
to read the appendices, and so the paper should be intelligible
without them.

To submit a paper, send to esorics05 at dti.unimi.it
<mailto:esorics05 at dti.unimi.it> a plain ASCII text
email containing the title and abstract of your paper, the authors'
names, email and postal addresses, phone and fax numbers, and
identification of the contact author. To the same message, attach
your submission (as a MIME attachment) in PDF or portable postscript
format. Do NOT send files formatted for word processing packages
(e.g., Microsoft Word or WordPerfect files). Submissions not meeting
these guidelines risk rejection without consideration of their merits.

Submissions must be received by March 25, 2005 in order to be
considered. Notification of acceptance or rejection will be sent to
authors by May 30, 2005. Authors of accepted papers must be prepared
to sign a copyright statement and must guarantee that their paper
will be presented at the conference. Authors of accepted papers must
follow the Springer Information for Authors' guidelines for the
preparation of the manuscript and use the templates provided there.

Pierangela Samarati
University of Milan
email: samarati at dti.unimi.it <mailto:samarati at dti.unimi.it>

Sabrina De Capitani di Vimercati
University of Milan
email: decapita at dti.unimi.it <mailto:decapita at dti.unimi.it>

Paul Syverson
Naval Research Laboratory
url: www.syverson.org <http://www.syverson.org>

Dieter Gollman
TU Hamburg-Harburg
email: diego at tuhh.de <mailto:diego at tuhh.de>

Claudio A. Ardagna
University of Milan, Italy
email: ardagna at dti.unimi.it <mailto:ardagna at dti.unimi.it>

Paper Submission due: March 25, 2005
Notification: May 30, 2005
Final papers due: June 30, 2005

Rakesh Agrawal IBM Almaden Research Center, USA
Gerard Allwein Naval Research Laboratory, USA
Ross Anderson University of Cambridge, UK
Vijay Atluri Rutgers University, USA
Michael Backes IBM Zurich Research Laboratory, Switzerland
Giampaolo Bella  University of Catania, Italy
Jan Camenisch IBM Zurich Research Laboratory, Switzerland
David Chadwick University of Kent, UK
Marc Dacier Institut Eurécom, France
Ernesto Damiani University of Milan, Italy
George Danezis University of Cambridge, UK
Simon Foley University College, Ireland
Philippe Golle Palo Alto Research Center, USA
Sushil Jajodia George Mason University, USA
Marit Hansen Independent Centre for Privacy Protection
Schleswig-Holstein, Germany
Philippa Hopcroft Oxford University, UK
Dogan Kesdogan RWTH Aachen, Informatik IV, Germany
Peng Liu The Pennsylvania State University, USA
Javier Lopez University of Malaga, Spain
Heiko Mantel ETH-Zentrum, Switzerland
Nick Mathewson The Free Haven Project, USA
Patrick McDaniel The Pennsylvania State University, USA
Peng Ning NC State University, USA
Peter Ryan University of Newcastle upon Tyne, UK
Kazue Sako NEC Corporation, Japan
Pierangela Samarati   University of Milan, Italy
Vanessa Teague University of Melbourne, Australian
Mariemma I. Yague University of Malaga, Spain
Alec Yasinsac Florida State University, USA

(Not yet completed)

Text by me above is hereby placed in the public domain

-------------- next part --------------
p2p-hackers mailing list
p2p-hackers at zgp.org
Here is a web page listing P2P Conferences:

More information about the e-lang mailing list