posted by user: ssr2018 || 4171 views || tracked by 4 users: [display]

SSR 2018 : Security Standardisation Research

FacebookTwitterLinkedInGoogle

Link: https://ssr2018.net/
 
When Nov 26, 2018 - Nov 27, 2018
Where Darmstadt, Germany
Submission Deadline Jul 6, 2018
Notification Due Aug 22, 2018
Final Version Due Sep 19, 2018
Categories    standardisation   information security   cryptography   cybersecurity
 

Call For Papers

Papers offering research contributions to the area of security standardisation are solicited for submission to the SSR 2018 conference. Papers may present theory, applications or practical experience in the field of security standardisation, including, but not necessarily limited to:

- access control
- biometrics
- cloud computing
- critical national infrastructure (CNI) protection
- consistency and comparison of multiple standards
- critiques of standards
- cryptanalysis
- cryptographic protocols
- cryptographic techniques
- evaluation criteria
- formal analysis of standards
- history of standardization
- identity management
- industrial control systems security
- internet security
- interoperability of standards
- intrusion detection
- key management and PKIs
- management of the standardisation process
- mobile security
- network security
- open standards and open source
- payment system security
- privacy
- regional and international standards
- RFID tag security
- risk analysis
- security controls
- security management
- security protocols
- security services
- security tokens
- smart cards
- telecommunications security
- trusted computing
- web security

New this year is that SSR will also accept Systematisation of Knowledge (SoK) papers relating to security standardisation, which integrate experience and previous research, drawing new comprehensive conclusions. SoK papers should evaluate, systematise, and contextualise existing knowledge. They should provide a new viewpoint, offer a comprehensive taxonomy, or cast doubt on long-held beliefs, based on compelling evidence. We also welcome SoK papers that document existing standardisation practices and analyse their weaknesses and strengths.

General Chair:
Marc Fischlin (TU Darmstadt, Germany)

Program Co-Chairs:
Cas Cremers (University of Oxford, UK)
Anja Lehmann (IBM Research – Zurich, Switzerland)

Program Committee:
Steve Babbage, Vodafone, UK
Liqun Chen, University of Surrey, UK
Jean Paul Degabriele, TU Darmstadt, Germany
Antoine Delignat-Lavaud, Microsoft Research, UK
Orr Dunkelman, University of Haifa, Israel
Cedric Fournet, Microsoft Research, UK
Britta Hale, Norwegian University of Science and Technology, Norway
Harry Halpin, INRIA, France
Tibor Jager, Paderborn University, Germany
John Kelsey, NIST, USA
Markulf Kohlweiss, University of Edinburgh, UK
Stephan Krenn, AIT Austrian Institute of Technology, Austria
Xuejia Lai, Shanghai Jiaotong University, China
Tancrede Lepoint, SRI International, USA
Peter Lipp, Graz University of Technology, Austria
Atul Luykx, Visa Research, USA
Catherine Meadows, Naval Research Laboratory, USA
David Naccache, ENS, France
Valtteri Niemi, University of Helsinki, Finland
Kenneth Paterson, Royal Holloway, University of London, UK
Eric Rescorla, Mozilla, USA
Matt Robshaw, Impinj, USA
Phillip Rogaway, University of California, Davis, USA
Mark Ryan, University of Birmingham, UK
Kazue Sako, NEC, Japan
Peter Schwabe, Radboud University, The Netherlands
Tom Shrimpton, University of Florida, USA
Ben Smyth, University of Luxembourg, Luxembourg
Douglas Stebila, McMaster University, Canada
Claire Vishik, Intel Corporation, UK
Michael Ward, MasterCard, UK
William Whyte, Security Innovation, USA

Instructions for Authors:
Submissions must be original and must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any journal or to any other conference or workshop that has published proceedings.

Authors submitting a systematisation of knowledge paper should have a title consisting of “SoK: Title”. This is to ensure that the committee is made aware that the paper is an SoK paper, and so will be reviewed with different criteria.

Submitted papers must be in PDF format and written in English. The submission must be anonymous with no author names, affiliations or obvious references. It should begin with a title, a short abstract, and an introduction. Papers should be at most 16 pages (excluding bibliography and appendices) in the standard LNCS format (see instructions at http://www.springer.de/comp/lncs/authors.html.). Reviewers are not obliged to read appendices, so the paper must be self-contained without them.

Papers that do not adhere to these requirements will be rejected without consideration of their merits.

Accepted papers will be presented at the conference and published in Springer’s Lecture Notes in Computer Science (LNCS) series. At least one author of each accepted paper must register for the conference.

Submission Site:
Papers must be submitted using the EasyChair system. The link will be provided on the conference website when the system is open for submissions.

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
SCM 2024   7th International Conference on Soft Computing, Control and Mathematics
CPAIOR 2024   International Conference on the Integration of Constraint Programming, Artificial Intelligence, and Operations Research
FLAIRS 2025   Florida Artificial Intelligence Research Society
IJCIS 2024   International Journal on Cryptography and Information Security
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
TRS 2025   Transportation Research Symposium
SECRYPT 2025   22nd International Conference on Security and Cryptography