ESORICS 2014 - 19th European Symposium on Research in Computer Security
Topics/Call fo Papers
ESORICS (European Symposium on Research in Computer Security) is the premier European research conference in computer security. ESORICS started in 1990 and has been held in several European countries, attracting an international audience from both the academic and industrial communities. ESORICS 2014, the 19th symposium in the series, will be held in Wroclaw, south-west Poland, at Wroclaw University of Technology.
Papers offering novel research contributions in all aspects of computer security are solicited for submission to ESORICS 2014. The primary focus is on
original, high quality, unpublished research, as well as
submissions describing implementation experiences, industrial research and developments.
Purely theoretical papers, e.g. in cryptography, must be explicit about the relevance of the theory to the security of IT systems.
Topics of interest include in particular:
access control
accountability
anonymity
applied cryptography
attack methods
authentication
audit and certification
biometrics
data protection
design methodology for security and privacy protection
digital content protection
digital forensic
electronic payments
embedded systems security
inference control
information hiding
identity management
information flow control
integrity
intrusion detection
formal security methods
language-based security
mobile code security
phishing and spam prevention
personal identity documents
privacy
risk analysis and management
system security
steganography
trust models and management
trustworthy user devices
web security
usable security
security visualization
security and privacy:
architectures
economics
metrics
models
policies
verification
security and privacy issues in:
ad hoc networks
cloud scenarios
complex systems
computer networks
database systems
distributed systems
operating systems
telecommunication and location services
security and privacy for mobile code
pervasive/ubiquitous computing
social networks
voting and other issues of e-democracy
web services
wireless systems
There will be awards for outstanding paper and outstanding student paper. A student paper is defined to be one in which at least one of the authors is a student who does not have a PhD at the time of submission. To be considered for the student paper award, the paper must be accompanied by a cover letter signed by all co-authors explicitly attesting to the central role and contributions of the student(s), and the paper must be presented by the student at ESORICS 2014. The cover letter should be in pdf format and uploaded at the same time as the paper.
Papers offering novel research contributions in all aspects of computer security are solicited for submission to ESORICS 2014. The primary focus is on
original, high quality, unpublished research, as well as
submissions describing implementation experiences, industrial research and developments.
Purely theoretical papers, e.g. in cryptography, must be explicit about the relevance of the theory to the security of IT systems.
Topics of interest include in particular:
access control
accountability
anonymity
applied cryptography
attack methods
authentication
audit and certification
biometrics
data protection
design methodology for security and privacy protection
digital content protection
digital forensic
electronic payments
embedded systems security
inference control
information hiding
identity management
information flow control
integrity
intrusion detection
formal security methods
language-based security
mobile code security
phishing and spam prevention
personal identity documents
privacy
risk analysis and management
system security
steganography
trust models and management
trustworthy user devices
web security
usable security
security visualization
security and privacy:
architectures
economics
metrics
models
policies
verification
security and privacy issues in:
ad hoc networks
cloud scenarios
complex systems
computer networks
database systems
distributed systems
operating systems
telecommunication and location services
security and privacy for mobile code
pervasive/ubiquitous computing
social networks
voting and other issues of e-democracy
web services
wireless systems
There will be awards for outstanding paper and outstanding student paper. A student paper is defined to be one in which at least one of the authors is a student who does not have a PhD at the time of submission. To be considered for the student paper award, the paper must be accompanied by a cover letter signed by all co-authors explicitly attesting to the central role and contributions of the student(s), and the paper must be presented by the student at ESORICS 2014. The cover letter should be in pdf format and uploaded at the same time as the paper.
Other CFPs
- 7th International Conference on Computational Intelligence in Security for Information Systems
- 9 th International Conference on Soft Computing Models in Industrial and Environmental Applications (SOCO 2014)
- 5th INTERNATIONAL CONFERENCE ON EUROPEAN EDUCATION
- Workshop on Graph-based Technologies and Applications
- SPS 2014 : Security and Privacy Symposium
Last modified: 2013-12-05 23:27:29