ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

SPW 2013 - Twenty-first International Workshop on Security Protocols

Date2013-03-18 - 2013-03-20

Deadline2013-01-07

VenueEngland, UK - United Kingdom UK - United Kingdom

Keywords

Websitehttps://spw.stca.herts.ac.uk/

Topics/Call fo Papers

The Twenty-first International Workshop on Security Protocols will take place from Monday March 18th to Wednesday March 20th, 2013 at Sidney Sussex College, Cambridge, England.
As with previous years, attendance at the International Workshop on Security Protocols is by invitation only.
In order to be invited you must submit a position paper. You are therefore encouraged to consider submitting such a paper.
Theme:
The theme of this year's workshop is "What's Happening on the Other Channel?"
Many protocols use a secondary channel, either explicitly (as in multichannel protocols) but more usually implicitly, for example to exchange master keys, or their hashes. The role of the Other Channel is fundamental, and often problematic, and yet protocol composers typically take them as a given.
Sometimes the Other Channel really is completely covert, but sometimes it just has properties that are different. And it's not only security properties that are relevant here: bandwidth, latency and error rate are often important considerations too. Even a line-of-sight channel usually doesn't quite have the properties that we unthinkingly attributed to it.
Moriarty has been subscribing to the Other Channel for years: perhaps it's time for Alice and Bob to tune in too.
The theme itself is not intended to restrict the topic of your paper, but to help provide a particular perspective and to focus the discussions. Our intention is to stimulate discussion likely to lead to conceptual advances, or to promising new lines of investigation, rather than merely to consider finished work.
Pre-proceedings will be provided at the workshop. The proceedings of previous workshops in this series have been published by Springer-Verlag as Lecture Notes in Computer Science (see LNCS 7114, 6615, 5964, 5087, 4631, 3957, 3364, 2845, 2467, 2133, 1796, 1550, 1361 and 1189). If you have not previously attended the Security Protocols Workshop, you may find it helpful to refer to these to get an idea of the flavour.

Last modified: 2012-11-02 22:22:14