Folks:

sara.fore...@unimi.it apparently didn't read "thus begins the great  
CFP crackdown of 2010" [1]. I've now set the "moderation" bit on  
sara.fore...@unimi.it. That account will not be able to post to this  
list again without first personally requesting that I unset the mod bit.

Regards,

Zooko, your friendly neighborhood list moderator

[1] http://lists.zooko.com/pipermail/p2p-hackers/2010-January/ 
002391.html

On Monday, 2010-02-15, at 1:54 , sara.fore...@unimi.it wrote:

> [Apologies if you receive multiple copies of this message]
>
> CALL FOR PAPERS
>
> ********************************************************************** 
> *
> 15th European Symposium on Research in Computer Security
> Hotel AMARILIA, Vouliagmeni, Athens, Greece
> 20-22 September 2010
> www.esorics2010.org
> ********************************************************************** 
> *
>
> ESORICS is the annual European research event in Computer Security.  
> The
> Symposium started in 1990 and has been held in several European
> countries, attracting a wide international audience from both the
> academic and industrial communities.
> Papers offering novel research contributions in computer security are
> solicited for submission to the Symposium. The primary focus is on
> original, high quality, unpublished research and implementation
> experiences. We encourage submissions of papers discussing industrial
> research and development.
> Papers should focus on topics such as:
>
> - Access Control
> - Accountability
> - Anonymity
> - Applied Cryptography
> - Attacks and Viral Software
> - Authentication and Delegation
> - Data Integrity
> - Database Security
> - Inference Control
> - Identity Management
> - Information Flow Control
> - Intrusion Tolerance
> - Formal Security Methods
> - Language-based Security
> - Network Security
> - Privacy Enhancing Technologies
> - Risk Analysis and Management
> - Secure Electronic Voting
> - Security Architectures
> - Security Economics
> - Security for Mobile Code
> - Security for Dynamic Coalitions
> - Security in Location Services
> - Security in Social Networks
> - Security Models
> - Security Verification
> - System Security
> - Trust Models and Management
> - Trust Theories
> - Trustworthy User Devices
>
> After the symposium, extended versions of selected papers will be
> considered for publication in a major security-focused journal. Those
> papers will need to undergo another round of review.
>
>
> INSTRUCTIONS FOR PAPER SUBMISSION
> The proceedings will be published by Springer in the LNCS Series. All
> submissions should follow the LNCS template from the time they are
> submitted. They should be at most 16 pages (using 11-point font),
> excluding the bibliography and well-marked appendices. Committee  
> members
> are not required to read the appendices, so the paper should be
> intelligible without them.
> All submissions must be written in English.
> Authors must submit their papers by the deadline indicated below,  
> using
> the symposium web site (www.esorics2010.org) and following the
> requirements stated there.
> All accepted papers should be presented at the Symposium; therefore,
> their authors must be prepared to sign a copyright transfer statement.
> At least one author of each accepted paper must register to the
> symposium, by the early date indicated by the organizers, and present
> the paper.
>
>
> IMPORTANT DATES
> Submission of papers: April 1, 2010
> Notification to authors: June 10, 2010
> Camera-ready copies: June 30, 2010
>
> GENERAL CHAIR
> Sokratis Katsikas, University of Piraeus (GR)
>
> PROGRAMME COMMITTEE CHAIRS
> Dimitris Gritzalis, AUEB (GR)
> Bart Preneel, K.U. Leuven (B)
>
> PROGRAMME COMMITTEE MEMBERS
> V. Atluri, Rutgers University (US)
> M. Backes, Saarland University and MPI-SWS (D)
> F. Bao, Institute for Infocomm Research (SG)
> J. Biskup, University of Dortmund (D)
> C. Blundo, Universita' di Salerno (I)
> X. Boyen, Stanford University (US)
> J. Camenisch, IBM Research Zurich (CH)
> S. Capkun, ETH Zurich (CH)
> R. Clayton, Cambridge University (UK)
> V. Cortier, LORIA-CNRS (F)
> F. Cuppens, IT TELECOM Bretagne (F)
> G. Danezis, Microsoft Research (UK)
> S. De Capitani di Vimercati, Universita' degli Studi di Milano (I)
> C. Diaz, K.U.Leuven (B)
> S. Foley, University College Cork (IE)
> C. Fournet, Microsoft Research (UK)
> D. Frincke, Pacific Northwest National Lab (US)
> D. Kesdogan, University of Siegen (D)
> D. Gollmann, Hamburg Univ. of Technology (D)
> T. Holz, Vienna University of Technology (A)
> B. Jacobs, University of Nijmegen (NL)
> S. Jajodia, George Mason University (US)
> T. Karygiannis, NIST (US)
> S. Katzenbeisser, T.U. Darmstadt (D)
> A. Kiayias, University of Athens (GR)
> M. Kudo, IBM Research Tokyo (J)
> K. Kursawe, Philips Research (NL)
> C. Lambrinoudakis, University of Piraeus (GR)
> J. Lopez, University of Malaga (E)
> W. Lee, Georgia Institute of Technology (US)
> I. Mavridis, University of Macedonia (GR)
> C. Mitchell, University of London (UK)
> J. Mitchell, Stanford University (US)
> A. Oprea, RSA Laboratories (US)
> R. Perlman, SUN Microsystems (US)
> A. Pfitzmann, T.U. Dresden (D)
> B. Pinkas, University of Haifa (IL)
> P. Ryan, University of Luxembourg (LU)
> M. Reiter, University of North Carolina (US)
> R. Safavi-Naini, University of Calgary (CA)
> P. Samarati, Universita' degli Studi di Milano (I)
> E. Snekkenes, Gjovik University College (NO)
> G. Spanoudakis, City University London (UK)
> I. Stamatiou, University of Ioannina (GR)
> P. Syverson, Naval Research Laboratory (US)
> B. Tsoumas, Ernst & Young and AUEB (GR)
> M. Waidner, IBM Corporation (US)
> D. Westhoff, HAW Hamburg (D)
>
> ORGANIZING COMMITTEE CHAIRS
> Nikolaos Kyrloglou, ACCI (GR)
> Marianthi Theoharidou, AUEB (GR)
>
> PUBLICITY CHAIR
> Sara Foresti, Universita' degli Studi di Milano (I)
>
>
>
> _______________________________________________
> p2p-hackers mailing list
> p2p-hackers@lists.zooko.com
> http://lists.zooko.com/mailman/listinfo/p2p-hackers

_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to