CSF 2014 - 27th IEEE Computer Security Foundations Symposium (CSF)
Date2014-07-20 - 2014-07-22
Deadline2014-03-01
VenueVienna, Austria
Keywords
Websitehttps://vsl2014.at/
- 20th International Conference on Availability, Reliability and Security
- 13th International Conference on Foundations of Computer Science & Technology (FCST 2025)
- The 2025 International Conference on Information Security and Computer Technology
- The 5th Int'l Conference on Information Security and Network Security(ISNS 2025)
- 9th International Conference on Cryptography, Security and Privacy (CSP 2025)
Topics/Call fo Papers
The Computer Security Foundations Symposium is an annual conference for researchers in computer security. CSF seeks papers on foundational aspects of computer security, e.g., formal security models, relationships between security properties and defenses, principled techniques and tools for design and analysis of security mechanisms as well as their application to practice. While CSF welcomes submissions beyond the topics listed below, the main focus of CSF is foundational security: submissions that lack foundational aspects risk rejection.
Topics
New theoretical results in computer security are welcome. Possible topics include, but are not limited to:
Access control
Accountability
Anonymity and Privacy
Authentication
Cryptographic protocols
Data and system integrity
Database security
Data provenance Decidability and complexity
Distributed systems security
Electronic voting
Executable content
Formal methods for security
Game Theory and Decision Theory
Hardware-based security
Information flow Intrusion detection
Language-based security
Network security
Resource usage control
Security for mobile computing
Security models
Socio-technical security*
Trust and trust management
Topics
New theoretical results in computer security are welcome. Possible topics include, but are not limited to:
Access control
Accountability
Anonymity and Privacy
Authentication
Cryptographic protocols
Data and system integrity
Database security
Data provenance Decidability and complexity
Distributed systems security
Electronic voting
Executable content
Formal methods for security
Game Theory and Decision Theory
Hardware-based security
Information flow Intrusion detection
Language-based security
Network security
Resource usage control
Security for mobile computing
Security models
Socio-technical security*
Trust and trust management
Other CFPs
- 26th International Conference on Computer Aided Verification (CAV)
- The Vienna Summer of Logic
- 3rd Annual International Conference on Computational Mathematics, Computational Geometry & Statistics - (CMCGS 2014)
- 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
- 4th ACM SIGSPATIAL International Workshop on GeoStreaming (IWGS)
Last modified: 2013-05-19 22:03:05