posted by user: jkawamoto || 5815 views || tracked by 8 users: [display]

ProvSec 2014 : The Eighth International Conference on Provable Security

FacebookTwitterLinkedInGoogle


Conference Series : Provable Security
 
Link: http://home.ie.cuhk.edu.hk/~provsec14/index.html
 
When Oct 9, 2014 - Oct 10, 2014
Where Hong Kong
Submission Deadline Jun 20, 2014
Notification Due Jul 23, 2014
Final Version Due Aug 12, 2014
Categories    security
 

Call For Papers

The Eighth International Conference on Provable Security (ProvSec 2014) will be held in Hong Kong on 9-10
October 2014. It will be organized by University of Hong Kong.
Provable security is an important research area in modern cryptography. Cryptographic primitives or protocols
without a rigorous proof cannot be regarded as secure in practice. In fact, there are many schemes that were originally
thought as secure but eventually broken, which clearly indicates the need of formal security assurance. With provable
security, we are confident in using cryptographic schemes and protocols in various real-world applications.
Meanwhile, schemes with provable security sometimes give only theoretical feasibility rather than a practical
construction, and correctness of the proofs may be difficult to verify. ProvSec conference thus provides a platform for
researchers, scholars and practitioners to exchange new ideas for solving these problems in the provable security area.
The previous ProvSec conference series were successfully held in Wollongong, Australia (2007), Shanghai, China
(2008), Guangzhou, China (2009), Malacca, Malaysia (2010), Xi’an, China (2011), Chengdu, China (2012) and
Malacca, Malaysia (2013). The conference proceedings will be published by Springer-Verlag in the Lecture Notes in
Computer Science series.
Conference Topics: All aspects of provable security for cryptographic primitives or protocols, include but are not
limited to the following areas:
• Asymmetric provably secure cryptography
• Cryptographic primitives
• Lattice-based security reductions
• Leakage-resilient cryptography
• Pairing-based provably secure cryptography
• Privacy and anonymity technologies
• Provable secure block ciphers and hash functions
• Secure cryptographic protocols and applications
• Security notions, approaches, and paradigms
• Steganography and steganalysis

Special issues:
Journal: Security and Communication Networks (SCN)
Topic: Special Issue on “Provably Secure Cryptographic Solutions for Wireless Networks”

We are further discussing with other journals for special issues of selected papers published in ProvSec (after
significant extension). More details will be announced later.
Important Dates:
Conference date: 9-10 October 2014
Paper submission deadline: 20 June 2014
Notification of acceptance: 23 July 2014
Proceedings version deadline: 12 August 2014

Conference Organization:
General Co-Chairs:
Lucas C.K. Hui (University of Hong Kong, Hong Kong) hui@cs.hku.hk
S.M. Yiu (University of Hong Kong, Hong Kong) smyiu@cs.hku.hk
Program Co-Chairs:
Sherman S. M. Chow (Chinese University of Hong Kong, Hong Kong) smchow@ie.cuhk.edu.hk
Joseph K. Liu (Institute for Infocomm Research, Singapore) ksliu@i2r.a-star.edu.sg
Program Committee:
Elena Andreeva (KU Leuven, Belgium)
Man-Ho Au (University of Wollongong, Australia)
Reza Azarderakhsh (Rochester Institute of Technology, US)
Joonsang Baek (Khalifa University of Science Technology and Research, UAE)
Paulo S. L. M. Barreto (University of São Paulo, Brazil)
Olivier Blazy (RUHR, Germany)
Andrej Bogdanov (Chinese University of Hong Kong, Hong Kong)
Sanjit Chatterjee (IISC, India)
Liqun Chen (HP Labs, UK)
Seung Geoi Choi (United States Naval Academy, US)
Georg Fuchsbauer (IST, Austria)
David Galindo (LORIA-CNRS, France)
Sanjam Garg (IBM Research, US)
Matthew Henricksen (Institute for Infocomm Research, Singapore)
Xinyi Huang (Fujian Normal University, China)
Stanislaw Jarecki (University of California at Irvine, US)
Miroslaw Kutylowski (Wroclaw University of Technology, Poland
Jin Li (Guangzhou University, China)
Shengli Liu (Shanghai Jiao Tong University, China)
Mark Manulis (University of Surrey, UK)
Sarah Meiklejohn (University of Calirofrnia at San Diego, US)
Kazuhiko Minematsu (NEC, Japan)
Atsuko Miyaji (JAIST, Japan)
Alptekin Küpçü (Koç University, Turkey)
Reza Reyhanitabar (EPFL, Switzerland)
Reihaneh Safavi-Naini (University of Calgary, Canada)
Alice Silverberg (University of California at Irvine, US)
Willy Susilo (University of Wollongong, Australia)
Koutarou Suzuki (NTT, Japan)
Tsuyoshi Takagi (Kyushu University, Japan)
Berkant Ustaoğlu (İzmir Institute of Technology)
Cong Wang (City University of Hong Kong, Hong Kong)
Duncan Wong (City University of Hong Kong, Hong Kong)
Wun-She Yap (Universiti Tunku Abdul Rahman, Malaysia)
Zongyang Zhang (AIST, Japan)

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
SEAS 2025   14th International Conference on Software Engineering and Applications
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
ISKE 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)
IJCSITY 2024   International Journal of Computational Science and Information Technology
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
ESORICS 2025   European Symposium on Research in Computer Security (round 2)