7

【ESORICS 2021】May. 12 @Darmstadt, Germany

 3 years ago
source link: https://www.chainnews.com/articles/894614292351.htm
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client

【ESORICS 2021】May. 12 @Darmstadt, Germany

点击“ 阅读原文”即可进入【ESORICS 2021】官网。 【ESORICS 2021】Important datesTitle and abstract: May 5, 2021Full paper submission: May 12, 2021Ear…

· 45 分钟前

点击“ 阅读原文”即可进入【ESORICS 2021】官网。

【ESORICS 2021】May. 12 @Darmstadt, Germany

【ESORICS 2021】

Important dates

  • Title and abstract: May 5, 2021

  • Full paper submission: May 12, 2021

  • Early reject notification: June 21, 2021

  • Authors responses due: June 25, 2021

  • Notification to authors: July 12, 2021

  • Camera ready due: August 12, 2021

  • Conference: October 4-8, 2021

  • CCF: B

Topics of interest include but are not limited to

  • Access control

  • Anonymity and censorship resistance

  • Applied cryptography

  • Artificial intelligence for security

  • Audit and accountability

  • Authentication and biometrics

  • Blockchains and distributed ledger security

  • Data and computation integrity

  • Database security

  • Digital content protection

  • Digital forensics

  • Formal methods for security and privacy

  • Hardware security

  • Information hiding

  • Identity management

  • Information flow control

  • Information security governance and management

  • Intrusion detection

  • Language-based security

  • Malware and unwanted software

  • Network security

  • Phishing and spam prevention

  • Privacy technologies and mechanisms

  • Risk analysis and management

  • Secure electronic voting

  • Security for artificial intelligence

  • Security economics and metrics

  • Security and privacy in cloud systems

  • Security and privacy in crowdsourcing

  • Security and privacy in internet of things and cyber-physical systems

  • Security and privacy in location services

  • Security and privacy in mobile computing

  • Security and privacy in social networks

  • Security and privacy in wireless and cellular communications

  • Security, privacy and resilience in critical infrastructures

  • Software security

  • Systems security

  • Trusted computing

  • Usable security and privacy

  • Web security

Welcome to the 26th European Symposium on Research in Computer Security (ESORICS) 2021. This year's Symposium will be held in Darmstadt, Germany on October 04 – 08, 2021.

Computer security is concerned with the protection of information in environments where there is a possibility of intrusion or malicious action. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas.

Progressively organised in a series of European countries, the symposium is confirmed as the European research event in computer security. Since its inception in 1990, ESORICS has been hosted in a series of European countries and has established itself as the premiere European research event in computer security.

The 26th edition of ESORICS is organised by the Fraunhofer Institute for Secure Information Technology and the National Research Center for Applied Cybersecurity ATHENE in Darmstadt, Germany. The conference is also supported by Springer.

General chair

  • Michael Waidner, Fraunhofer SIT, Germany | National Research Center for Applied Cybersecurity ATHENE, Germany

Program committee chairs

  • Elisa Bertino, Purdue University, USA

  • Haya Shulman, Fraunhofer SIT, Germany | National Research Center for Applied Cybersecurity ATHENE, Germany

Program committee members

  • Ruba Abu-Salma, ICSI/UC Berkeley, USA

  • Yehuda Afek, Tel Aviv University, Israel

  • Mitsuaki Akiyama, NTT, Japan

  • Cristina Alcaraz, UMA, Spain

  • Mark Allman, International Computer Science Institute (ICSI), USA

  • Vijay Atluri, Rutgers University, USA

  • Erman Ayday, Case Western Reserve University, USA

  • Guangdong Bai, University of Queensland, Australia

  • Lejla Batina, Radboud University, Nijmegen, The Netherlands

  • Steven M. Bellovin, Columbia University, USA

  • Antonio Bianchi, Purdue University, USA

  • Marina Blanton, University at Buffalo, USA

  • Carlo Blundo, Università degli Studi di Salerno, Italy

  • Tamara Bonaci, Northeastern University, USA

  • Nora Boulahia Cuppens, Polytechnique Montréal, Canada

  • Lorenzo Cavallaro, King's College London, UK

  • Berkay Celik, Purdue University, USA

  • Aldar C-F. Chan, BIS Innovation Hub Hong Kong Centre, Hong Kong

  • Liqun Chen, University of Surrey, UK

  • Rongmao Chen, National University of Defense Technology, China

  • Xiaofeng Chen, Xidian University, China

  • Yu Chen, School of Cyber Science and Technology, Shandong University, China

  • Sherman Chow, Chinese University of Hong Kong (CUHK), Hong Kong

  • Mauro Conti, University of Padua, Italy

  • Scott Coull, FireEye, Inc., USA

  • Bruno Crispo, University of Trento, Italy

  • Michel Cukier, University of Maryland, USA

  • Frédéric Cuppens, Polytechnique Montréal, Canada

  • George Danezis, UCL, UK

  • Sanchari Das, University of Denver, USA

  • Sabrina De Capitani di Vimercati, Università degli studi di Milano, Italy

  • Hervé Debar, Télécom SudParis, France

  • Roberto Di Pietro, Hamad Bin Khalifa University - College of Science and Engineering, Qatar

  • Wenrui Diao, Shandong University, China

  • Tassos Dimitriou, Computer Technology Institute, Greece and Kuwait University, Kuwait, Kuwait

  • Shlomi Dolev, Ben-Gurion University, Israel

  • Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain

  • Changyu Dong, Newcastle University, UK

  • Haixin Duan, Tsinghua University, USA

  • François Dupressoir, University of Surrey, UK

  • Pardis Emami Naeini, Carnegie Mellon University, USA

  • Paulo Esteves-Veríssimo, Université du Luxembourg, Luxembourg

  • Jose-Luis Ferrer-Gomila, University of the Balearic Islands, Spain

  • Sara Foresti, Università degli studi di Milano, Italy

  • Michael Franz, University of California Irvine, USA

  • David Galindo, University of Birmingham, UK

  • Debin Gao, Singapore Management University, Singapore

  • Joaquin Garcia-Alfaro, Telecom SudParis, France

  • Siddharth Garg, New York University, USA

  • Thanassis Giannetsos, Technical University of Denmark, Department of Computer Science (DTU Compute), Denmark

  • Dieter Gollmann, Hamburg University of Technology, Germany

  • Neil Gong, Duke University, USA

  • Stefanos Gritzalis, University of Piraeus, Greece

  • Daniel Gruss, Institute for Applied Information Processing and Communications, Graz University of Technology, Austria

  • Zhongshu Gu, IBM T.J. Watson Research Center, USA

  • Thomas Haines, Norwegian University of Science and Technology, Norway

  • Feng Hao, University of Warwick, UK

  • Juan Hernández-Serrano, Universitat Politècnica de Catalunya, Spain

  • Xinyi Huang, Fujian Normal University, China

  • Syed Hussain, Purdue University, USA

  • Sotiris Ioannidis, Technical University of Crete, Greece

  • Tibor Jager, Bergische Universität Wuppertal, Germany

  • Yuseok Jeon, Ulsan National Institute of Science and Technology (UNIST), South Korea

  • Shouling Ji, Zhejiang University, China

  • Ghassan Karame, NEC Laboratories Europe, Germany

  • Sokratis Katsikas, Norwegian University of Science and Technology, Norway

  • Aggelos Kiayias, University of Edinburgh, UK

  • Hyoungshick (Hyoung) Kim, Sungkyunkwan University (SKKU), South Korea

  • Ryan Ko, University of Queensland, Australia

  • Juliane Krämer, TU Darmstadt, Germany

  • Steve Kremer, INRIA, France

  • Marina Krotofil, Honeywell Industrial Cyber Security Lab, USA

  • Christopher Kruegel, University of California, Santa Barbara, USA

  • Yonghwi Kwon, University of Virginia, USA

  • Costas Lambrinoudakis, University of Piraeus, Greece

  • Shir Landau-Feibish, The Open University of Israel, Israel

  • Kyu Hyung Lee, University of Georgia, USA

  • Corrado Leita, VMware, UK

  • Shujun Li, University of Kent, UK

  • Zitao Li, Purdue University, USA

  • Kaitai Liang, Delft University of Technology, The Netherlands

  • Xiaojing Liao, Indiana University Bloomington, USA

  • Hoon Wei Lim, Trustwave, Singapore

  • Zhiqiang Lin, Ohio State University, USA

  • Xiangyu Liu, Alibaba Group, China

  • Joseph Liu, Monash University, Australia

  • Rongxing Lu, University of New Brunswick, Canada

  • Xiapu Luo, Hong Kong Polytechnic University, Hong Kong

  • Shiqing Ma, Rutgers University, USA

  • Leandros Maglaras, De Montfort University, UK

  • Fabio Martinelli, IIT-CNR, Italy

  • Sjouke Mauw, Université du Luxembourg, Luxembourg

  • Weizhi Meng, Department of Applied Mathematics and Computer Science, Technical Universtiy of Denmark, Denmark

  • Nele Mentens, KU Leuven, Belgium

  • Mira Mezini, TU Darmstadt, Germany

  • Chris Mitchell, Royal Holloway, University of London, UK

  • Tal Moran, Interdisciplinary Center Herzliya, Israel

  • Tatsuya Mori, Waseda University, Japan

  • Johannes Mueller, University of Luxembourg, Luxembourg

  • Max Mühlhäuser, TU Darmstadt, Germany

  • David Naccache, Ecole normale suprieure, France

  • Siaw-Lynn Ng, Royal Holloway, University of London, UK

  • Nick Nikiforakis, Stony Brook University, USA

  • Jianting Ning, National University of Singapore / Singapore Management University, Singapore

  • Satoshi Obana, Hosei University, Japan

  • Martín Ochoa, AppGate Inc., Colombia

  • Rolf Oppliger, eSECURITY Technologies, Switzerland

  • Rebekah Overdorf, Ecole Polytechnique Fédérale de Lausanne, Switzerland

  • Sikhar Patranabis, Visa Research, Palo Alto, CA, USA

  • Jiaxin Pan, Norwegian University of Science and Technology, Norway

  • Radia Perlman, DELL EMC, USA

  • Günther Pernul, Universität Regensburg, Germany

  • Frank Piessens, KU Leuven, Belgium

  • Joachim Posegga, Univ. of Passau, Germany

  • Jean-Jacques Quisquater, Université Catholique de Louvain, Belgium

  • Awais Rashid, University of Bristol, UK

  • Michael Reiter, Duke University, USA

  • Kui Ren, State University of New York at Buffalo, USA

  • Junghwan "John" Rhee, University of Central Oklahoma, USA

  • Giovanni Russello, Dept of Computer Science, The University of Auckland, New Zealand

  • Peter Y A Ryan, University of Luxembourg, Luxembourg

  • Reihaneh Safavi-Naini, University of Calgary, Canada

  • Merve Sahin, SAP Security Research, France

  • Amin Sakzad, Monash University, Australia

  • Pierangela Samarati, Università degli studi di Milano, Italy

  • Damien Sauveron, XLIM (UMR University of Limoges/CNRS 7252), France

  • Sebastian Schinzel, FH Münster, Germany

  • Steve Schneider, University of Surrey, UK

  • Bruce Schneier, BT, USA

  • Dominique Schröder, Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), Germany

  • Michael Schwarz, CISPA Helmholtz Center for Information Security, Germany

  • Joerg Schwenk, Ruhr-Universität Bochum, Germany

  • Kent Seamons, Brigham Young University, UK

  • Bardin Sébastien, CEA LIST, France

  • Jean-Pierre Seifert, TU Berlin, Germany

  • Kris Shrishak, TU Darmstadt, Germany

  • Radu Sion, Stony Brook University, USA

  • Nigel Smart, KU Leuven, Belgium

  • Einar Snekkenes, Norwegian University of Science and Technology (NTNU), Norway

  • Juraj Somorovsky, Ruhr-Universität Bochum, Germany

  • Thorsten Strufe, KIT, Germany

  • Willy Susilo, University of Wollongong, Australia

  • Paul Syverson, U.S. Naval Research Laboratory, USA

  • Qiang Tang, Luxembourg Institute of Science and Technology, Luxembourg

  • Qiang Tang, NJIT/University of Sydney, USA

  • Dave Tian, Purdue University, USA

  • Laura Tinnel, SRI International, USA

  • Nils Ole Tippenhauer, CISPA Helmholtz Center for Information Security, Germany

  • Jacob Torrey, Amazon Web Services, USA

  • Ari Trachtenberg, Boston University, USA

  • Helen Treharne, University of Surrey, UK

  • Aggeliki Tsohou, Ionian University, Greece

  • Mathy Vanhoef, New York University Abu Dhabi, Abu Dhabi

  • Luca Viganò, King's College London, UK

  • Michael Waidner, Fraunhofer SIT, Germany | National Research Center for Applied Cybersecurity ATHENE, Germany

  • Cong Wang, City University of Hong Kong, Hong Kong

  • Haining Wang, Virginia Tech Research Center - Arlington, USA

  • Lingyu Wang, Concordia University, Canada

  • Weihang Wang, SUNY University at Buffalo, China

  • Bing Wang, University of Connecticut, USA

  • Edgar Weippl, University of Vienna & SBA Research, Austria

  • Avishai Wool, Tel Aviv University, Israel

  • Christos Xenakis, University of Piraeus, Greece

  • Yang Xiang, Swinburne University of Technology, Australia

  • Minhui Xue, The University of Adelaide, Australia

  • Guomin Yang, University of Wollongong, Australia

  • Jie Yang, Florida State University, USA

  • Kang Yang, State Key Laboratory of Cryptology, China

  • Yuval Yarom, University of Adelaide, Australia

  • Xun Yi, RMIT University, Australia

  • Yu Yu, Shanghai Jiao Tong University, China

  • Fengwei Zhang, SUSTech, China

  • Kehuan Zhang, The Chinese University of Hong Kong, Hong Kong

  • Yang Zhang, CISPA Helmholtz Center for Information Security, Germany

  • Yinqian Zhang, Southern University of Science and Technology, China

  • Yuan Zhang, Fudan University, China

  • Zhenfeng Zhang, Chinese Academy of Sciences, China

  • Yunlei Zhao, Fudan University, China

  • Jianying Zhou, Singapore University of Technology and Design, Singapore

  • Sencun Zhu, The Pennsylvania State University, USA

【ESORICS 2021】May. 12 @Darmstadt, Germany

【ESORICS 2021】May. 12 @Darmstadt, Germany

【ESORICS 2021】May. 12 @Darmstadt, Germany


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK