SPW 2015 - Twenty-third International Workshop on Security Protocols
Date2015-03-31 - 2015-04-02
Deadline2015-01-07
VenueCambridge, UK - United Kingdom
Keywords
Websitehttps://spw.stca.herts.ac.uk
Topics/Call fo Papers
The Twenty-third International Workshop on Security Protocols will take place from Tuesday March 31st to Thursday April 2nd, 2015 at Sidney Sussex College, Cambridge, England.
As with previous years, attendance at the International Workshop on Security Protocols is by invitation only.
In order to be invited you must submit a position paper. You are therefore encouraged to consider submitting such a paper!
Theme:
The theme of this year's workshop is "Information Security in Fiction and in Fact".
Fiction can become fact: mobile phones look and operate the way they do because the engineers who design them watched Star Trek when they were children.
But yesterday's facts also become today's fictions: today most privacy protocols are theatrical performances, albeit not always playing to a live audience.
How is information security handled in fiction, and what aspects of this could we emulate in next-generation technology if we tried? And how much of what we do now should be relegated to writers of historical fiction?
This theme is not intended to restrict the topic of your paper, but to help provide a particular perspective and focus to the discussions. Our intention is to stimulate discussion likely to lead to conceptual advances, or to promising new lines of investigation, rather than merely to consider finished work.
As with previous years, attendance at the International Workshop on Security Protocols is by invitation only.
In order to be invited you must submit a position paper. You are therefore encouraged to consider submitting such a paper!
Theme:
The theme of this year's workshop is "Information Security in Fiction and in Fact".
Fiction can become fact: mobile phones look and operate the way they do because the engineers who design them watched Star Trek when they were children.
But yesterday's facts also become today's fictions: today most privacy protocols are theatrical performances, albeit not always playing to a live audience.
How is information security handled in fiction, and what aspects of this could we emulate in next-generation technology if we tried? And how much of what we do now should be relegated to writers of historical fiction?
This theme is not intended to restrict the topic of your paper, but to help provide a particular perspective and focus to the discussions. Our intention is to stimulate discussion likely to lead to conceptual advances, or to promising new lines of investigation, rather than merely to consider finished work.
Other CFPs
Last modified: 2014-11-19 23:30:56