WAHC 2015 - 3rd Workshop on Encrypted Computing and Applied Homomorphic Cryptography
Topics/Call fo Papers
The cloud hype and different recent disclosures clearly show that there is a strong demand for secure delegation of computation. The workshop addresses the challenge to safely process data on remote resources by protecting programs and data even during processing. This allows to outsource the computation of confidential information independently from the trustworthiness or the security level of the remote delegate. The technologies and techniques discussed in this workshop are a key to extend the range of applications that can be securely outsourced.
The goal of the workshop is to bring together researchers with practitioners and industry to present, discuss and to share the latest progress in the field. We want to exchange ideas that address real-world problems with practial approaches and solutions.
Topics include (but are not limited to)
Implementation issues of homomorphic encryption schemes
Practical performance evaluations of homomorphic encryption schemes
Practical aspects of functional encryption
Software architectures for encrypted applications
Platform and system integration for encrypted applications
Algorithmic primitives for encrypted applications
Encrypted search schemes
Encrypted e-payment solutions
Encrypted financial transactions
Encrypted applications in bio-informatics
Hybrid (partly encrypted) applications
Hardware implementations of encrypted computing
Intended audience
Professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, encrypted computing, functional encryption and secure function evaluation, private information retrieval and searchable encryption.
The goal of the workshop is to bring together researchers with practitioners and industry to present, discuss and to share the latest progress in the field. We want to exchange ideas that address real-world problems with practial approaches and solutions.
Topics include (but are not limited to)
Implementation issues of homomorphic encryption schemes
Practical performance evaluations of homomorphic encryption schemes
Practical aspects of functional encryption
Software architectures for encrypted applications
Platform and system integration for encrypted applications
Algorithmic primitives for encrypted applications
Encrypted search schemes
Encrypted e-payment solutions
Encrypted financial transactions
Encrypted applications in bio-informatics
Hybrid (partly encrypted) applications
Hardware implementations of encrypted computing
Intended audience
Professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, encrypted computing, functional encryption and secure function evaluation, private information retrieval and searchable encryption.
Other CFPs
- 38th International Conference on Boundary Elements and Other Mesh Reduction Methods
- International Conference on Utilization and Management of Non-Wood Forest Products For Sustainable Livelihoods
- International Symposium on Conservation and Management of Pollinators for Sustainable Agriculture and Ecosystem Services
- HIPAA Breach Notification - Preventing and Responding to Health Information Breaches
- OSHA Injury and Illness Record Keeping
Last modified: 2014-08-22 23:11:28