[Apologies if you receive multiple copies of this message]

                           CALL FOR PAPERS

***********************************************************************
14th European Symposium on Research in Computer Security (ESORICS 2009)
             September 21-25, 2009, Saint Malo, France
                       http://www.esorics.org
***********************************************************************

Papers offering novel research contributions in any aspect of computer
security are solicited for submission to the Fourteenth European
Symposium on Research in Computer Security (ESORICS 2009). Organized in
a series of European countries, ESORICS is confirmed as the leading
European research event in computer security. The symposium started in
1990 and has been held on alternate years in different European
countries and attracts an international audience from both the academic
and industrial communities. From 2002 it has been held yearly. The
Symposium has established itself as one of the premiere, international
gatherings on Information Assurance.

Papers may present theory, technique, applications, or practical
experience on topics including, but not limited to:

- access control
- anonymity
- authentication
- authorization and delegation
- cryptographic protocols
- data integrity
- dependability
- information flow control
- smartcards
- systems security
- digital right management
- accountability
- applied cryptography
- covert channels
- cybercrime
- denial of service attacks
- formal methods in security
- inference control
- information warfare
- steganography
- transaction management
- data and application security
- intellectual property protection
- intrusion tolerance
- peer-to-peer security
- language-based security
- network security
- non-interference
- privacy-enhancing technology
- pseudonymity
- subliminal channels
- trustworthy user devices
- identity management
- security as quality of service
- secure electronic commerce
- security administration
- security evaluation
- security management
- security models
- security requirements engineering
- security verification
- survivability
- information dissemination control
- trust models and trust management policies

The primary focus is on high-quality original unpublished research, case
studies and implementation experiences. We encourage submissions of
papers discussing industrial research and development. Proceedings will
be published by Springer-Verlag in the Lecture Notes in Computer Science
(LNCS) series.

PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. Papers should be at most 15 pages excluding
the bibliography and well-marked appendices (using 11-point font and
reasonable margins), and at most 20 pages total. Committee members are
not required to read the appendices, and so the paper should be
intelligible without them. Papers must be submitted using the conference
web site and following the requirements stated there. Authors of
accepted papers must be prepared to sign a copyright statement and must
guarantee that their paper will be presented at the conference.
Additionally, they must follow the Springer Information for Authors’
guidelines for the preparation of the manuscript and use the templates
provided there.

IMPORTANT DATES
- Paper submissions due: April 17, 2009 23:59:59 PST
- Acceptance notifications: June 8, 2009
- Camera-ready papers due: June 29, 2009


COMMITTEES

GENERAL CHAIRS
- Frédéric Cuppens, TELECOM Bretagne, France
- Nora Cuppens-Boulahia, TELECOM Bretagne, France

PROGRAM COMMITTEES CHAIRS
- Michael Backes, Saarland University and MPI-SWS, Germany
- Peng Ning, North Carolina State University, USA

PROGRAM COMMITTEE
- Mike Atallah, Purdue University, USA
- Michael Backes, Saarland University and MPI-SWS, Germany (co-chair)
- David Basin, ETH Zurich, Switzerland
- Nikita Borisov, University of Illinois at Urbana-Champaign, USA
- Srdjan Capkun, ETH Zurich, Switzerland
- Marc Dacier, EURECOM, France
- Anupam Datta, Carnegie Mellon University, USA
- Herve Debar, France TELECOM R&D, France
- Roger Dingledine, The Freehaven Project, USA
- Wenliang Du, Syracuse University, USA
- Cédric Fournet, Microsoft Research Cambridge, UK
- Virgil Gligor, Carnegie Mellon University, USA
- Carl A. Gunter, University of Illinois at Urbana-Champaign, USA
- Dieter Gollmann, Hamburg University of Technology, Germany
- Sushil Jajodia, George Mason University, USA
- Xuxian Jiang, North Carolina State University, USA
- Peeter Laud, University of Tartu, Estonia
- Wenke Lee, Georgia Institute of Technology, USA
- Donggang Liu, University of Texas at Arlington, USA
- Michael Locasto, George Mason University, USA
- Matteo Maffei, Saarland University, Germany
- Heiko Mantel, University of Darmstadt, Germany
- Catherine Meadows, Naval Research Laboratory, USA
- John Mitchell, Stanford University, USA
- Peng Ning, North Carolina State University, USA (co-chair)
- Alina Oprea, RSA, USA
- Radia Perlman, Sun Microsystems, USA
- Adrian Perrig, Carnegie Mellon University, USA
- Mark Ryan, University of Birmingham, UK
- Pierangela Samarati, Universita degli Studi di Milano, Italy
- Vitaly Shmatikov, University of Texas at Austin, USA
- Wade Trappe, Rutgers University, USA
- Patrick Traynor, Georgia Institute of Technology, USA
- Dominique Unruh, Saarland University, Germany
- Dan S. Wallach, Rice University, USA
- Andreas Wespi, North Carolina State University, USA
- Ting Yu, IBM Research, Switzerland
- Yanyong Zhang, Rutgers University, USA








_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to