posted by user: comqjam || 6774 views || tracked by 6 users: [display]

SPW 2013 : Twenty-first International Workshop on Security Protocols

FacebookTwitterLinkedInGoogle

Link: http://spw.stca.herts.ac.uk/
 
When Mar 18, 2013 - Mar 20, 2013
Where Cambridge, England
Submission Deadline Jan 7, 2013
Notification Due Jan 31, 2013
Final Version Due Mar 4, 2013
Categories    security   security protocols   information security   software security
 

Call For Papers

The Twenty-first International Workshop on Security Protocols will take place from Monday March 18th to Wednesday March 20th, 2013 at Sidney Sussex College, Cambridge, England.

As with previous years, attendance at the International Workshop on Security Protocols is by invitation only.

In order to be invited you must submit a position paper. You are therefore encouraged to consider submitting such a paper.

The theme of this year's workshop is "What's Happening on the Other Channel?"

Many protocols use a secondary channel, either explicitly (as in multichannel protocols) but more usually implicitly, for example to exchange master keys, or their hashes. The role of the Other Channel is fundamental, and often problematic, and yet protocol composers typically take them as a given.

Sometimes the Other Channel really is completely covert, but sometimes it just has properties that are different. And it's not only security properties that are relevant here: bandwidth, latency and error rate are often important considerations too. Even a line-of-sight channel usually doesn't quite have the properties that we unthinkingly attributed to it.

Moriarty has been subscribing to the Other Channel for years: perhaps it's time for Alice and Bob to tune in too.

The theme itself is not intended to restrict the topic of your paper, but to help provide a particular perspective and to focus the discussions. Our intention is to stimulate discussion likely to lead to conceptual advances, or to promising new lines of investigation, rather than merely to consider finished work.

Pre-proceedings will be provided at the workshop. The proceedings of previous workshops in this series have been published by Springer-Verlag as Lecture Notes in Computer Science (see LNCS 7114, 6615, 5964, 5087, 4631, 3957, 3364, 2845, 2467, 2133, 1796, 1550, 1361 and 1189). If you have not previously attended the Security Protocols Workshop, you may find it helpful to refer to these to get an idea of the flavour.

To be considered for invitation, you must send a first draft of a position paper to James Malcolm (j.a.malcolm@herts.ac.uk) by the deadline noted above. If you wish, you may make an initial response to say that you are potentially interested.

Feel free to circulate this invitation widely, but do remember that the workshop has a limited size and in order to be invited you must submit a position paper. A printable copy of this announcement may be found at http://spw.stca.herts.ac.uk/Advertisement2013.pdf.

If you are invited to the workshop, don't forget to send us a revised copy of your paper (for inclusion in the pre-proceedings) by the deadline above. You should also register using the form that will be provided.

If you have any enquiries about the workshop then you might want to look on the web-site, but if your question is not answered there, please contact one of the organizing committee:

Bruce Christianson (Email: B.Christianson AT herts.ac.uk) Professor of Informatics, University of Hertfordshire

James A. Malcolm (Email: J.A.Malcolm AT herts.ac.uk, Tel: +44-1707-284310).

Frank Stajano (University of Cambridge)

Jonathan Anderson (University of Cambridge)

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
Social Sustainability 2025   Twenty-first International Conference on Environmental, Cultural, Economic & Social Sustainability
SEAS 2025   14th International Conference on Software Engineering and Applications
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
SECRYPT 2025   22nd International Conference on Security and Cryptography
TSD 2025   Twenty-eighth International Conference on Text, Speech and Dialogue
ICISSP 2025   11th International Conference on Information Systems Security and Privacy
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ANT 2025   The 16th International Conference on Ambient Systems, Networks and Technologies (ANT)