Calls for Papers

IEEE Computer Society's Technical Committee on Security and Privacy


Past Conferences and Journal Special Issues

Last Modified:01/13/05

Note: Please contact by email if you have any questions..



Past Conferences and Other Announcements - 2000

PRDC 2000  Pacific Rim International Symposium on Dependable Computing, University of California at Los Angeles (UCLA),  December 18-20, 2000.  [posted here 5/29/00]
The Pacific Rim International Symposium on Dependable Computing (PRDC) is a symposium for dissemination of state-of-the-art research and engineering practice in dependable computing with particular emphasis on systems and software. This will be the seventh of this series of international symposia, and it comes at a fortuitous time when many computer industries are recognizing dependability to be one of their top problems due to the demands of the Internet. Topics of interest include (but are not limited to):
    - Design for system dependability 
    - Fault-tolerant systems and software 
    - Fault tolerance for parallel and distributed systems 
    - Software and hardware reliability, verification and testing 
    - Dependability measurement, modeling and evaluation 
    - Safety and security of computing systems 
    - Tools for design and evaluation of dependable systems 
    - Implications of emerging technologies on dependable system design (e.g., deep submicron VLSI, pervasive computing)
    - Application-specific dependable system (e.g., embedded systems, WWW servers, transaction processing) 
More information can be found on the conference web site at

HiPC'2000, 7th IEEE International Conference on High Performance Computing, special session on performance modeling of mobile telecommunication networks, December 17-20, 2000, Bangalore, India.  [posted here 4/22/00]
The objective of this session is to bring together technologists and researchers of international reputation to have a forum for discussions and presentations  of their state-of-the-art work in all aspects of wireless communications and  mobile computing, with particular emphasis on performance modeling and analysis of mobile communications capability.  Authors are invited to submit original unpublished manuscripts for a special session on Mobile Computing. Topics of interest include (but not limited to):
*  Performance modeling of wireless networks (PCS, Ad hoc, Satellite Networks)
*  Mobility, data, resource management, and scheduling issues in wireless and mobile networks
*  Mobile applications and tools for distributed databases
*  Wireless Internet and WWW, simulation of wireless networks
*  Mobile Agents
*  Quality-of-service (QoS) provisioning
*  Wireless multimedia systems
*  Routing and location independent information access
*  Parallel Simulation of large scale wireless systems
*  Security, scalability and reliability for mobile/wireless systems
*  Architectures of mobile/wireless networks and systems
*  Traffic integration for mobile applications
*  Design and analysis of algorithms for mobile environments
*  Influence of lower layers on the design and performance of higher layers
*  Scalable Servers Wireless Mobile Computing
Complete submission instructions are given on the conference web page at:

ADCOM 2000, 8th International Conference on Advanced Computing and Communications, Cochin, India, December 14-16, 2000. [posted here 4/22/00]
The annual conference of ACS is intended to provide a forum for interaction amongst industry, professionals, researchers and government policy planners with a view to sharing ideas, report findings, discuss products and define future directions.  The topics of interest include, but are not limited to:
         *High speed networks
         * Parallel, distributed and networked computing
         * Web based computing
         * Business computing
         * Parallel and distributed databases and data warehousing
         * EDI and e-commerce
         * Multimedia systems
         * High performance graphics, visualization and virtual reality
         * Secure computing
More information can be found on the conference web page at:

FSTTCS 2000  The 20th Conference on the Foundations of Software Technology and Theoretical Computer Science, New Delhi, India, December 13-15, 2000.   [posted here 5/29/2000]
This annual conference provides a platform for presentation of original research results in fundamental aspects of computer science. It also provides an excellent forum for meeting and exchanging ideas with people who are at the frontline of software technology and theoretical computer science.  The Conference Proceedings will be published by Springer-Verlag in the series Lecture Notes in Computer Science (LNCS). Previous proceedings appeared as LNCS Volumes: 880, 1026, 1180, 1346, 1530, 1738.   A list of topics of interest along with detailed instructions for submitting a paper can be found at the conference web site at

ACSAC, 16th Annual Computer Security Applications Conference, Sheraton Hotel, New Orleans, Louisiana, USA, December 11-15, 2000. [posted here 3/14/00]
[update 9/30/00: The advance program has been published at This year’s distinguished speaker is Dr. Eugene H. Spafford, and the invited essayist is Dr Butler Lampson.]
The following topic areas are of potential interest to ACSAC.

Internet technologies Intrusion detection and response / audit and audit reduction
Mobile computing Network management and smart card applications
Electronic commerce Incident response planning - governmental and other perspectives
Legal and ethical concerns over protecting intellectual property New paradigms for protecting electronic intellectual capital
Software safety and program correctness Crypto, key management, and digital signature applications
Security in health care and law enforcement Defensive information warfare
Securing very high-speed telecommunications (e.g., ATM)  


We encourage technical papers that relate to any of the above topics or other applications of computer security. Papers will be refereed prior to selection and one author will be expected to present at the conference. Format of submission is explained on our web site: Student papers can compete for best paper prizes and student conference scholarships are also provided. Panel discussions are always an important part of the conference since they promote a lively dialogue with all attendees and the panel members. Be sure to see our discussion page at If you have an idea for a panel or forum, see our web site for details:  Again this year we will have a track devoted to actual applications where real world problems have been solved. Vendors, systems integrators, and users can share knowledge and we will also have a display area to complement this portion of the conference. For details, see our web site: Tutorials are either full day (6instruction hours) or half day (3 instruction hours). For details, see our web page at  Got a question? See the FAQ on our web page at, or email

INDOCRYPT'2000, First International Conference on Cryptology in India, Indian Statistical Institute, Calcutta, India, December 10-13, 2000. (Submissions due: August 10, 2000) [posted here 3/4/00]
Original papers on all technical aspects of cryptology are solicited.  Please see the conference web page at for paper submission details.

Privacy'2000 Information & Security in the Digital Age, Ohio Supercomputer Center, Columbus, Ohio, USA, November 29, 2000. [posted here: 3/4/00].
The Technology Policy Group at the Ohio Supercomputer Center will be hosting a conference entitled Information & Security in the Digital Age. Privacy2000 is a follow-up to last year's groundbreaking Ohio Business Privacy Forum, the inaugural event in the TPG's Technology in Business Series (see for information on the 1999 conference). Expected speakers include Professor Peter P. Swire, Chief Counselor of Privacy for the Office of Management and Budget for the United States; Jason Catlett, President Junkbusters; in addition, we are putting together a moderated roundtable to be televised on public television. Through interactive workshops and panels, we seek to inform business, industry, medical and legal personal, government, and the public on vital privacy issues and possible solutions. We expect this year's attendance to be between 250-300.  For more information, contact Mike Zandpour at (614-92-6477).

ICNP'2000  The Eighth International Conference on Network Protocols, Osaka, Japan, November 14-17, 2000.   [posted here 7/30/00]
ICNP deals with all aspects of communication protocols, from design and specification, to verification, testing, performance analysis, and implementation. Protocol functions of interest include network access, switching, routing, flow and congestion control, multimedia transport, wireless and mobile networks, network security, web protocols and applications, electronic commerce, network management, interoperability, internetworking, home computing and networks and digital broadcasting.   See the conference web page at for more information.

LCN'2000  The 25th Annual IEEE Conference on Local Computer Networks, Tampa, FL, USA, November 8-10, 2000.   [posted here 7/30/00]
The IEEE LCN conference is the premier conference on leading edge and practical computer networking. The emphasis of this conference is on practical solutions to important problems in computer networking.  Topics of interest include:  Local Area Networks,  Home Networks, Wireless Networks, Storage Area Networks, Optical Networks, Real-time Networks, Active Networks, ATM, Gigabit Ethernet, LAN/WAN Internetworking, DSL Technologies, Network Management, Network Security, Network Reliability, Multicasting, Enabling QoS in High-Speed Networks, Always On / Always Connected, Internet / Intranet, Anything-over-IP, IP-over-Anything, Performance Evaluation, and  Protocol Design and Validation.  More information can be found on the conference web page at

NGC2000  The 2nd International Workshop on Networked Group Communication, Stanford University, Palo Alto, California, USA, November 8-10, 2000.   [posted here 5/29/2000]
The aim of the Workshop is to allow researchers and practioners to present the design and implementation techniques for networked group communication. The focus of the Workshop is strictly on multicast and networked group communication. This Workshop is the second and only international event in this area (first workshop was in Pisa, Italy, in November 1999). Authors are invited to submit papers on any issue related to networked group communication, including but not limited to:
      -  multicast congestion control
      -  multicast routing, naming, address allocation
      -  scalability in multicast services
      -  reliable and semi-reliable multicast protocols
      -  novel multicast architectures
      -  multicast security
      -  multicast deployment related issues
      -  multicast over heterogeneous media
      -  multipeer applications (distributed interactive apps, games, DIS)
      -  QoS issues with multicast
      -  Pricing and economic model for multicast traffic
      -  group management techniques
      -  network engineering for multicast services
Information on submission of papers, along with additional information on the conference can be found at the conference web site at

WSPEC'00, 1st Workshop on Security and Privacy in E-Commerce, November 4, 2000, Athens, Greece. Held in conjunction with the ACM Conference on Computers and Communications Security (ACM-CCS'00) [posted here 3/20/00]
The First Workshop on Security and Privacy in E-Commerce seeks to bring together practitioners and researchers to address the real-world security and privacy concerns in e-commerce. We are seeking contributions on topics in security and privacy that will enable the e-commerce systems of tomorrow to be developed more securely and robustly without compromising individual privacy rights. The workshop will focus on group discussion and collaboration in identifying the important problems and potential solutions in this important topic area.  We are seeking research papers, business case studies, or system designs that address security and privacy concerns.  Topics of interest include:
       *  anonymizing e-commerce/Web transactions 
       *  component-based software in e-commerce 
       *  databases access control 
       *  denial of service attacks and countermeasures 
       *  detecting anomalous database transactions 
       *  detection and recovery from Internet-based attacks 
       *  e-commerce protocols 
       *  e-commerce systems 
       *  Internet client risks 
       *  malicious software or Trojan functionality 
       *  mobile agents in e-commerce 
       *  novel attacks and countermeasures 
       *  privacy negotiation/bartering 
       *  privacy risks with cookies/tokens/identifiers 
       *  software analysis and certification. 
See for the official Call For Papers.

AMOC 2000, Asian International Mobile Computing Conference, Penang, Malaysia, November 1-3, 2000. [posted here 11/17/99]
This conference will provide a platform for researchers and experts primarily from the Asian region to meet and discuss current issues in this field. The focus on Asia is important because there are unique regional issues not given attention in typical international conferences, where technological issues in developed nations receive centre stage. These unique issues include different infrastructural and economic requirements; the effect of a more diverse socio-economic environment on technological specifications; the wider-ranging impact of wireless communication in rural areas and the great interest in the rapid deployment of cutting edge technology due to the high progress rate of technological implementation in many Asian countries. A complete list of topics and guidelines for submissions is given on the conference web site at, or send email to

CCS-2000, 7th ACM Conference on Computer and Communication Security, November 1-4, 2000, Athens, Greece.  [posted here 11/11/99]
for submission to the 7th ACM Conference on Computer and Communication Security. Papers may present theory, technique, applications, or practical experiences on topics including:

*Database Security *Authentication and key management

*New threats and attacks *Authorization, access control, audit

*Privacy and anonymity *Cryptographic algorithms, protocols

*Steganography, watermarking *New security architectures

*Secure electronic commerce *Intrusion detection and response

*Security evaluation *Licensing and intellectual property

*Security education *Malicious code and countermeasures

Details on instructions for papers and panel proposals can be obtained from (USA Mirror site: or from Sushil Jajodia (

ACM-MM'2000  Eighth ACM International Multimedia Conference, Los Angeles, CA, USA, October 30-November 3, 2000.    [posted here 7/30/00]
Technical issues, theory and practice, artistic and consumer innovations will bring together researchers, artists, developers, educators, performers, and practitioners of multimedia.  The technical program will consist of plenary sessions and talks with topics of general interest in three main tracks: (1) multimedia processing and coding, including multimedia content analysis, content-based multimedia retrieval, multimedia security, audio/image/video processing, compression, etc., (2) multimedia system support and networking, including network protocols, Internet, operating systems, middleware, servers, QoS, databases, thin clients, etc., (3) multimedia tools, end-systems and applications, including hypermedia systems, user interfaces, authoring, multi-modal interaction and integration, multimedia education, design and applications of virtual environments, etc.  In addition to technical papers, there will be panel sessions, demonstrations, tutorials, and poster sessions.  For complete information on the workshop,  see the conference web site at or contact one of the general chairs: Shahram Ghandeharizadeh (, Shih-Fu Chang (

Safecomp'2000  Rotterdam, the Netherlands, October 24-27, 2000.    [posted here 7/30/00]
Safecomp is an annual 2.5 days-event reviewing the state of the art, experiences and new trends in the areas of computer safety, reliability and security regarding dependable applications of computer systems. Safecomp focuses on critical computer applications. It is intended to be a platform for technology transfer between academia, industry and research institutions. Papers are invited on all aspects of computer systems in which safety, reliability and security are important. Industrial sectors include, but are not restricted to medical devices, avionics, space industry, railway and road transportation, process industry, automotive industry, power plants and nuclear power plants.  More information can be found on the conference web page at


ISW'2000, Third IEEE Information Survivability Workshop, Boston, MA, USA, October 24-26, 2000.  [posted here 8/2/00]
The Information Survivability Workshops provide a forum for researchers, practitioners, and sponsors to discuss problems associated with the survivability of mission-critical systems, and to identify solutions to these problems. A primary goal of the workshops is to identify and highlight new survivability research ideas that can contribute to the protection of critical infrastructures and critical applications. Another important goal is to foster research collaboration to improve the survivability of systems that support our global information society. Participation in the workshop is BY INVITATION ONLY, based on the submission of a short position paper (of up to 4 pages in length). The position paper should clearly indicate how the background or interests of the author(s) would contribute to the goals of the workshop. We are especially interested in submissions that either: (a) summarize new research results, (b) describe dependability and fault-tolerance approaches for enhancing survivability, (c) summarize case studies or experience with critical applications, or (d) document relevant policy or other approaches (such as insurance) that contribute to the survivability of critical applications. A complete list of topics of interest and instructions for submitting a position paper are given on the conference web site at, or you may contact the workshop organizers at



OSDI'2000  Fourth Symposium on Operating System Design and Implementation, San Diego, CA, USA, October 23-25, 2000.    [posted here 7/30/00]
Co-sponsored by IEEE TCOS and ACM SIGOPS. The goal of the fourth OSDI is to present innovative, exciting work in the systems area. OSDI brings together professionals from academic and industrial backgrounds and has become a premiere forum for discussing the design, implementation, and implications of systems software. OSDI takes a broad view of what the systems area encompasses and seeks contributions from all fields of systems practice, including: operating systems, networking, distributed systems, parallel systems, mobile systems, embedded systems, and the influence of hardware developments on systems and vice-versa.   For more information, see the symposium Web site,, or e-mail

PROMS2000  Protocols for Multimedia Systems,  Cracow, Poland, October 22-25, 2000.    [posted here 5/29/00]
The PROMS2000 conference is intended to contribute to a scientific, strategical and practical cooperation between research institutes and industrial companies in the area of distributed multimedia applications, protocols, and intelligent management tools, with emphasis on their provision over broadband networks.  An extensive list of topics of interest, along with instructions for submitting a paper, can be found on the conference web page at

Mathematical Sciences Research Institute Number-Theoretic Cryptography Workshop, Berkeley, CA, USA, October 16-20, 2000. [posted here: 7/30/00].
Organizers: Eric Bach, Dan Boneh, Cynthia Dwork, Shafi Goldwasser, Kevin McCurley, and Carl Pomerance. 
This workshop will focus on number-theoretic aspects of cryptography, and will be cross-cultural, where the the cultures in question are ``mathematics'' and ``computer science. ''
We will be sufficiently flexible to accommodate anything exciting that arises between now and the fall of 2000, so any plans are tentative. We will have several survey talks on the state of the
art of such central topics to number theory in cryptography as: integer factorization, discrete logarithm algorithms, and elliptic curves. From the computer science side, we will survey: positive applications of lattices to cryptography,  lattice basis reduction techniques for cryptanalysis, and "new'' number-theoretic assumptions in vogue in 2000.  A final survey talk will discuss two historical tracks that met in 1998: practical cryptosystems (RSA, El-Gamal, OAEP, and Cramer-Shoup), and the theory that lead to increasingly stronger notions of security and cryptosystems satisfying these notions (Goldwasser and Micali's construction for semantic security, Naor and Yung's construction for chosen-ciphertext security in the pre-processing mode, Dolev, Dwork and Naor's construction for non-malleability against chosen-ciphertext in the post-processing mode, and Cramer-Shoup's efficient non-malleable cca-post construction). The program committee for the cryptography conference is: Eric Bach, Dan Boneh, Cynthia Dwork, Shafi Goldwasser, Kevin McCurley, and Carl Pomerance.  Additional information about the conference and registration can be found at  /

IC3N'2000, Ninth International Conference on Computer Communications and Networks, Las Vegas, Nevada, USA,  October 16-18, 2000. [posted here: 7/30/00].
ICCCN is a major international forum to present original and fundamental advances in the field of Computer Communications and Networks. It also serves to foster communication among researchers and practitioners working in a wide variety of scientific areas with a common interest in improving Computer Communications and Networks.  Topics of interest include:
   * Optical Communication Networks Wireless/Mobile/Satellite Comm Networks
   * ATM Networking Internet Services/Applications
   * Wireless Multimedia Applications Real-time Communications
   * Quality of Services (QoS) Issues LAN/WAN Internetworking
   * Network Interoperability Personal Communication Services
   * Network Control Management Broadband Networks
   * Intelligent Networks Multicast and Routing Protocols
   * Network Security Media Access Control/Mobility Algorithms
   * Network Reliability High Speed Network OAM/Protocols
   * Video-on-Demand Data Traffic Engineering
   * Network Management/Billing Global Infrastructure Network Evolution
   * Network Processor Technology Performance Modeling/Analysis
   * Communication Software Protocol Design/Validation/Testing
   * Networked Databases Network Architectures
   * Terabit optical switching/routing architectures and signaling
More information can be found on the conference web site at

NORDSEC'2000, Fifth Nordic Workshop on Secure IT Systems - Encouraging Cooperation, Reykjavik, Iceland, October 12-13, 2000.  [posted here 3/14/00]
The NORDSEC workshops were started in 1996 with the aim to bring together researchers and practitioners within IT security in the Nordic countries. These workshops have remained a forum for co-operation between the Nordic research organizations, industry and the computer societies. The emphasis of the workshop is to encourage interchange and cooperation between the research community and the industrial and software development community. The theme of the workshop is applied security, i.e., all kinds of security issues for all kinds of information technology systems. We are in particular looking for contributions that deal with technology transfer and application of research in development. Furthermore, this year's NORDSEC will look more specifically at several Special Topics that are closely related to Computer Security, but are not often discussed in the same forum: Software Engineering, Virus Protection, and Privacy Protection. Details are to be found on the conference website at


SOFTCOM'2000, Eighth International Conference on Software, Telecommunications and Computer Networks (co-sponsored by the IEEE Communications Society), held aboard the luxury ship "Marko Polo", October 10-14, 2000.   [posted here 7/30/00].
SoftCOM 2000 provides an open forum for communication technology researchers and engineers to discuss new and emerging systems, standards and services, and their applications in telecommunication and information systems. Topics to be addressed include, but are not limited to the following:
     * Telecommunication Software Production, Tools, Evaluation and Languages
     * Object and Component Technologies in Telecommunication Software
     * Telecommunication Services Design and QoS
     * Internet Environments and Service
     * IP Based Networks and Services
     * High-Speed Protocols and Networks
     * Wireless Communications
     * Multimedia Systems and Services
     * Computer Telephone Integration
     * Information Security
     * AI and Recognition Methods
     * Virtual Environments
     * Computer Methods in Biomedicine
     * Electromagnetic Compatibility
More information can be found on the conference web site at

DISC'2000, 14th International Symposium on DIStributed Computing, Toledo, Spain, October 4-6, 2000.   [posted here January 27, 2000].
Original contributions to theory, design, analysis, implementation, or application of distributed systems and networks are solicited. Topics of interest include, but are not limited to: distributed algorithms and their complexity, fault-tolerance of distributed systems, consistency conditions, concurrency control, and synchronization, multiprocessor/cluster architectures and algorithms, cryptographic and security protocols for distributed systems, distributed operating systems, distributed computing issues on the internet and the web , distributed systems management, distributed applications, such as databases, mobile agents, and electronic commerce, communication network architectures and protocols, specification, semantics, and verification of distributed systems.  A "brief announcement track" has been set up for ongoing work for which full papers are not ready yet or recent results published elsewhere are suitable for submission as brief announcements. More information on submissions can be found at the conference web page at is available at   

ECC'2000 The 4th Workshop on Elliptic Curve Cryptography, University of Essen, Essen, Germany, October 4-6, 2000. [posted here: 3/4/00].
ECC' 2000 is the fourth in a series of annual workshops dedicated to the study of elliptic curve cryptography and related areas. The main themes of ECC'2000 will be:
    *  The discrete logarithm and elliptic curve discrete logarithm problems.
    *  Provably secure discrete log-based cryptographic protocols for
        encryption, signatures and key agreement.
    *  Efficient software and hardware implementation of elliptic curve cryptosystems.
    *  Deployment of elliptic curve cryptography.
There will be approximately 15 invited lectures (and no contributed talks), with the remaining time used for informal discussions. There will be both survey lectures as well as lectures on latest research developments.  A list of confirmed speakers can be found on the conference web page (see below).  If you did not receive this announcement by email and would like to be added to the mailing list for the second announcement, please send email to The announcements are also available from the web sites: and

ESORICS 2000, 6th European Symposium on Research in Computer Security Toulouse, France, October 4-6, 2000.  [posted here 11/4//99]
We solicit papers describing original ideas and new results on the foundations and applications of computer security. The primary focus is on high-quality original unpublished research, case studies and implementation experiences. We encourage submissions of papers discussing industrial research and development. Suggested topics include but are not limited to:



* Distributed Systems

* Theoretical Foundations of Security



* Operating Systems Security

* Telecom. and High Speed Network Security



* Network Security  

* Security and mobile systems



* Internet Security  

* Security in Data and Knowledge Bases



* Electronic Commerce 

* Development of Secure Systems



* Security of small systems

* Management of Secure Systems



* Intellectual Property Protection

* Multimedia and Digital Libraries



* Security Evaluation

* Security versus other Requirements



* New applications of Cryptography



Details on submissions of papers and panel proposals and other information available at and from



RAID' 2000  Third International Workshop on the Recent Advances in Intrusion Detection (in conjunction with ESORICS 2000), Toulouse, France, October 2-4, 2000.    [posted here February 7, 2000]
This workshop, the third in an ongoing annual series, will bring together leading figures from academia, government, and industry to discuss state-of-the-art intrusion detection technologies and issues from the research and commercial perspectives. RAID 2000 will welcome full papers in addition to extended abstracts and panel proposals, and has organized peer review to publish hardcopy proceedings.  Regarding paper submissions, submissions to RAID 2000 can be either a full-length paper or an extended abstract. Full papers are intended for the presentation of mature research results, while extended abstracts are intended for work-in-progress presentations. It is expected that more time will be allocated to full paper presentations. Panel submissions are also sought in the same areas. This year, we are emphasizing the following topic areas  (see the workshop web page for a more detailed list):

* Assessing, measuring and classifying intrusion-detection systems

* IDS in High Performance and Real-Time Environments

* Vulnerabilities and Attacks

* IDS Integration

* Innovative Approaches

* Practical Considerations

Full papers must be limited to 6000 words, full page figures being counted as 300 words.  Authors should follow the instructions given by Springer Verlag ( for the preparation of the manuscript. Extended abstracts must be original contributions and are limited to 1200 words in length.  Panel proposals must be limited to 400 words in length.  Please see the workshop web page at for a detailed list of topics of interest along with instructions for authors. 



ISSE' 2000, Barcelona, September 27-29, 2000.    [posted here 1/27/00].
ISSE is the European institution for the presentation and discussion of technical, organizational, legal and political concepts for information security and data protection.  The conference provides presentations and panel discussions about existing and future information security solutions for large scale corporations, enterprises, especially SMEs, commerce, financial & public sector, healthcare, legal practitioners and security professionals.  An extensive list of topics and submission instructions are given in the full call-for-papers

Workshop on Telecommunications Security, The University of Tulsa, Tulsa, Oklahoma, USA, September 27-28, 2000.  [posted here 6/9/00]
The purpose of the workshop is to identify the security issues and solutions emerging as telecommunications and information networks converge and support telephony and data services. Of particular interest are issues related to convergence, the Next Generation Network, active networks, voice over Internet Protocol (IP), unified messaging systems, multi-service networks, and universal broadband access. The workshop will integrate the needs of the industry, the current state of research in academia, and the relevant government research programs. Presentations are solicited in three areas:
1.How will the telecommunications world change and what security issues will arise? 
2.What is the state of current telephony security research? 
3.What is the appropriate role of government in addressing these problems? 
Industry representatives are encouraged to submit position papers on their view of the emerging public and private infrastructures and any proposed architectures, especially security architectures, to provide services over those infrastructures. Descriptions of current and future security threats, vulnerabilities, and requirements are encouraged. Academic representatives are encouraged to submit papers of their current security research in public and private telecommunications networks. Of particular interest are the areas of fraud prevention, intrusion detection, availability solutions, privacy, and secure management schemes. Differences between security issues and solutions for emerging telecommunications networks, computer data-oriented and infrastructure operations networks should be emphasized. This is a self-supporting workshop, and each attendee's (including speakers) organization is expected to provide the necessary support for attendance. All attendees are expected to participate in the discussions and presentations. There will be relatively few slots available for those who are not presenting. For additional information on submissions , please call Dr. Paul Brusil at 978-922-6586  or visit

EDOC'2000 Fourth International Enterprise Distributed Object Computing Conference, Makuhari, Japan, September 25-28, 2000   [posted here 7/30/00]
The goal of EDOC 2000 is to provide a forum for leading researchers and industry experts to discuss problems, solutions, and experiences in meeting practical enterprise computing needs. EDOC 2000 will include industrial experience sessions for which practitioners are encouraged to submit experience reports stating the problems addressed, methods used, results and
lessons learned.  EDOC 2000 addresses generic issues relating to the context in which enterprise systems are built and deployed as well as the distributed object and component technologies needed to deploy systems for specific application domains. EDOC 2000 encourages submissions on applications and industry experience in such domains as electronic commerce, enterprise application integration, supply-chain management, and web-based distributed applications.  More information can be found on the conference web site at or send email to

WISAC Workshop on Innovations in Strong Access Control, Monterey, California, September 25-27, 2000   [posted here 6/16/00]
WISAC is an invitational workshop whose goal is to increase the understanding of the different communities with an interest in Strong Access Control (SAC) technology; to develop statements of requirements for communities by bringing together customers with a need for SAC solutions with vendors, developers and researchers; and to determine the next steps for growth of SAC technology.  WISAC is an invitational workshop. This format has been selected to keep the workshop size down and to keep the discussions focused. To request an invitation, please submit (by 11:59 PM PDT, Monday, June 26, 2000) a description of your organization and its involvement with or needs for information technology for security policy enforcement to Please mark this submission clearly as WISAC RFI.  More information can be found at the workshop web page at 

CARDIS 2000, IFIP CARDIS 2000 Fourth Smart Card Research and Advanced Application Conference HP Labs, Bristol, UK, September 20-22, 2000.  [posted here: 11/8/99].
Smart cards or IC cards offer a huge potential for information processing purposes. The portability and processing power of IC cards allow for highly secure conditional access and reliable distributed information systems. The research challenges range from electrical engineering on the hardware side to tailor-made cryptographic applications on the software side, and their synergies. The CARDIS conferences aim to bring together researchers who are active in all aspects of design of IC cards and related devices and environment, such as to stimulate synergy between different research communities and to offer a platform for presenting the latest research advances. Additional information at

PKS' 2000  Catch the Perfect Wave of the New Mobile World, San Jose, CA, USA, September 19-21, 2000.   [posted here 7/30/00]
PKS 2000 is a forum where developers, security architects, product managers and business leaders will learn about and discuss such topics as: What new business opportunities will arise from the convergence of wireless voice communication, remote data access and the Internet?  Which of the emerging standards and protocols will drive the next generation wireless data systems and services?  How are powerful new public-key systems, such as the Elliptic Curve Cryptosystem, facilitating the new world of wireless/mobile e-business?  See the conference web site at for more information the presentation topics.

NSPW' 2000  New Security Paradigms Workshop 2000, Ballycotton, County Cork, Ireland, September 19-21, 2000.   [posted here 1/27/00]
For eight years, the New Security Paradigms Workshop has provided a productive and highly interactive forum in which innovative new approaches (and some radical older approaches) to computer security have been offered, explored, refined, and published. The workshop offers a constructive environment where experienced researchers and practitioners work alongside newer participants in the field.  The result is a unique opportunity to exchange ideas.  Because these are new paradigms, we cannot predict what subjects will be covered. Any paper that presents a significant shift in thinking about difficult security issues or builds on a previous shift will be welcomed.  To participate, please submit your paper, justification, and attendance statement, preferably via e-mail, to both Program Chairs -- Cristina Serban ( and Brenda Timmerman ( -- by Friday, March 31, 2000 (hardcopy submissions must be received by Friday, March 24, 2000). Further details on the required format of submissions are available on the NSPW web site at 

International School on Foundations of Security Analysis and Design, September 18-30, 2000, Bertinoro, Italy.    
The school covers two weeks (from Monday 18 to Saturday 30, September 2000)and alternates four lecturers per week on monographic courses of about 6/8 hours each. Saturdays are reserved for presentations given by those participants that intend to take advantage of the audience for discussing their current research in the area. The school is organised at the Centro Residenziale Universitario of the University of Bologna, situated in Bertinoro, a small village on a scenic hill with a wonderful panorama, in between Forli' and Cesena (about 50 miles south-east of Bologna, 15 miles from the Adriatic sea). The school offers eight main courses, each composed of 3/4 seminars (on different days), each seminar of 2 hours. In alphabetic order, the lecturers of the eight main courses are the following:  Li Gong (Javasoft - Sun Microsystems, Palo Alto),  Java Security;  Andrew D. Gordon (Microsoft Research, Cambridge) Process Calculi for Security and Mobility;  Roberto Gorrieri (University of Bologna)Classification of Security Properties;  Joshua Guttman (Mitre, Bedford) Security Goals: Packet trajectories and strand spaces;  Peter Ryan (SRI, Cambridge) Mathematical Models of Computer Security;  Pierangela Samarati (University of Milano)Access Control: Policies, Models, Architectures and Mechanisms;  Paul Syverson (Naval Research Lab, Washington) The Logic of Security Protocols;  Moti Yung (CertCo Inc., New York)Cryptographic Technology and Protocols in E-Commerce. Further short courses will be given by: Carlo Blundo (Univ. of Salerno)Introduction to Cryptography;  Luigia Carlucci Aiello and Fabio Massacci (Univ. of Roma "La Sapienza")Planning, Logic Programs and Security Protocols;   Pierpaolo Degano (Univ. of Pisa)Control Flow Analysis for security;  Rocco De Nicola (Univ. of Firenze) Testing for spi Processes;  Fausto Giunchiglia (Univ. of Trento)Model Checking Using a Logic of Belief;- Roberto Segala (Univ. of Bologna) Applied Cryptography.  More information can be foune on the course web page at



Biometric Consortium 2000 Conference "Biometric Technologies...Emerging into the Mainstream",  NIST, Gaithersburg, MD, USA,  September 13-14, 2000.   [posted here 8/ 2/00]
Some of the topics that will be examined include:

    - What are the technological issues and challenges looming ahead?

    - What are the user requirements?

    - What standards are available or are being developed?

    - How is interoperability achieved?

    - How assurance is achieved?

    -What novel applications of biometrics does the industry envision for secure personal authentication and identification?

More information on the conference can be found at, or contact Fernando L. Podio of the Information Technology Laboratory of NIST at or at (301) 975-2947.


ASA/MA 2000  Second International Symposium on Agent Systems and Applications, Fourth International Symposium on Mobile Agents, ETH Zurich, Switzerland, September 13-15, 2000.   [posted here 1/ 27/00]
Areas of interest are: agent applications, agent systems, multi-agent systems, mobile agents, and  mobile code.  Possible topics include: development tools, security, scalability, fault tolerance, communication, collaboration and coordination, languages, standards, design patterns, applications in mobile computing and wireless networks, applications in electronic markets and commerce, applications in active networks, market-based control, resource management, agent societies and ensembles, World-wide-web integration.  Submission guidelines are at; additional workshop information can be found at: or  

ICECCS'2000 Sixth IEEE International Conference on Engineering of Complex Computer Systems, Boissonade Tower, Ichigaya Campus, Hosei University, Tokyo, Japan, September 11-15, 2000.   [posted here 1/27/00]
The goal of this conference is to bring together industrial, academic, and government experts, from a variety of user domains and software disciplines, to determine how the disciplines' problems and solution techniques interact within the whole system.   The scope of interest includes long-term research issues, near-term complex system requirements and promising tools, existing complex systems, and commercially available tools.  Papers are solicited in all areas related to complex computer-based systems, including the causes of complexity and means of avoiding, controlling, or coping with complexity. Topic areas include, but are not limited to:
       - System and Software Architecture and Systems Engineering
       - Tools, Environments, and Languages for Complex Systems
       - Complex Data Management, including Distributed, Real-Time, and Mobile Databases
       - Formal Methods and Approaches to Achieving Dependability in Complex Systems
       - Integration of Heterogeneous Technologies
       - Software and System Development Processes for Complex Systems
       - Human Factors and Collaborative ("Groupware") Aspects
       - Interoperability and Standardization
       - System and Software Safety and Security 
Detailed instructions for submitting a paper, a panel proposal, or a tutorial proposal are given on the conference web page at

WECS'2000 Practicum Workshop on Education in Computer Security, Center for Information Systems Security Studies and Research, Naval Postgraduate School, Monterey, California, USA, September 11-13, 2000.
This workshop helps those new to computer security teach a well-organized comprehensive Computer and Network Security course or update CS and IT courses with relevant security information. The workshop will clarify confusing topics and will address important information often not found in introductory texts. The workshop is organized and conducted by experienced security educators. Topics covered will include:
   - A scientific or engineering approach to security (as opposed to patches and ad hoc solutions).
   - Debunking many popular computer security and cryptography myths.
   - Many real life simple and beautiful examples that illustrate important concepts.
   - Subtle important issues that are often overlooked or misunderstood.
   - Analogies and projects that are useful in teaching difficult topics.
   - Ideas for demonstrations and laboratory exercises. 
More information can be found on the workshop web page at

ISSSTA 2000, IEEE Sixth International Symposium on Spread Spectrum Techniques and Applications, Sheraton Tara, Parsippany, NJ, USA, September 6-8, 2000.  [posted here: 9/3/99].
Prospective authors are cordially invited to submit papers in particular but not exclusively on the following topics:  THEORY (Spreading codes and sequences, waveform design, spectral shaping; synchronization, acquisition, tracking; coding and modulation for SS; direct sequencing, frequency hopping, hybrid concepts; digital and analog SS signal processing, estimation theory; CDMA, SSMA, interference cancellation, joint (multiuser) detection, capacity; information security, ECM, EVCCM, LPI; antennas for SS, propagation effects, channel modelling, anti-fading techniques, RAKE; coexistence SS/other systems, overlay systems, EMC; networking; power control, AGC, amplifier nonlinearities.  SYSTEM DESIGN: Tools for SS system design, modeling and simulation, application of AI; frequency allocation; networking aspects, handover, dynamic channel allocation; SS techniques in education.  COMMUNICATIONS: Mobile & cellular, CDMA, SSMA, satellite; digital broadcasting; power line communications; radio relay; optical SS communications; wireless LANs; SS bus systems, consumer applications, remote control; packetized data & voice networks.  NAVIGATION, RANGING, CHANNEL SOUNDING: GPS, GLONAS, radar, lidar, pulse compression; wideband channel sounding; deep-space applications; correlation techniques to measure flow and speed; SS time domain reflectometry.  DEVICES AND CIRCUITS: ASICs for SS, chip sets, digital correlators, frequency synthesizers, all digital transmitter and receiver implementations, SAW, CCD, neural networks.  Please submit five double-spaced copies of original papers to the ISSSTA 2000 Technical Program Committee Chairman as per schedule. Detailed submission instruction and other information can be found on the conference web page at:


CoopIS'2000  In Cooperation with VLDB'2000, Neptune Hotel, Eilat, Israel, September 6-8, 2000.  [posted here 5/29/2000]
CoopIS'2000 is the seventh conference in the series and the fifth conference organized by the International Foundation on Cooperative Information Systems (IFCIS). It is sponsored by the International Foundation in Cooperative Information Systems (IFCIS), and the IBM Research Laboratory in Haifa (other sponsors pending). It replaces the erstwhile international workshops on Interoperability in Multidatabase Systems (IMS) and the conference series on Cooperative Information Systems (CoopIS & ICICIS).  The conference web page is at

MDDS'2000  Third International Workshop on Mobility in Databases and Distributed Systems (in conjunction with DEXA'2000), Greenwich, UK,  September 6-8, 2000.  [posted here 7/30/2000]
The focus of this workshop is on mobility issues in distributed systems and databases. The objective of this workshop is to bring together researchers and practitioners with mobile networking background, database research interests, advanced applications and distributed computing systems research and development skills to discuss all aspects of emerging mobile computing paradigm. Both the theoretical papers and papers reporting implementation and practical results will be presented.  Details about DEXA'2000 can be found at; the MDDS'2000 workshop web page is at

DEXA2000  11th International Conference and Workshop on Database and Expert Systems Applications, London - Greenwich, United Kingdom, September 4- 8, 2000.  [posted here 5/29/00]
The aim of DEXA 2000 is to present both research contributions in the area of data and expert systems and a large spectrum of already implemented or just being developed applications. DEXA will offer the opportunity to extensively discuss requirements, problems, and solutions in the field. The workshop and conference should inspire a fruitful dialogue between developers in practice, users of database and expert systems, and scientists working in the field.  The conference web page is at

NBIS2000 The Third International Workshop on Network-Based Information Systems in conjunction with the 11th International Conference on Database and Expert Systems Applications (DEXA'2000), Greenwich, United Kingdom, September 4-8, 2000.  [posted here 5/29/00]
The main objective of this workshop is to bring together researchers from both network systems and information systems with the aim of encouraging the exchange of ideas and experience between these two communities. Topics of interest include but are not limited to:
     * Communication Networks and Protocols
     * Internet Applications
     * Web-based database systems
     * Distributed Cooperating Information Systems
     * Groupware
     * Distributed and Parallel Algorithms
     * Multimedia Computing and Communication Systems
     * Mobile Computing Systems
     * Distributed Object-Oriented Systems
     * Interoperable Systems
     * Electronic Commerce
     * Security and Privacy
     * Distributed Fault-Tolerant Systems
More information can be found on the conference web page at

CRYPTO 2000, Santa Barbara, California, USA, August 20-24, 2000.  [posted here 5/29/00]
Crypto 2000 is organized by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy, and the Computer Science Department of the University of California, Santa Barbara. For other information contact
          Mathew Franklin, General Chair, Crypto 2000 
          Xerox Parc 
          3333 Coyote Hill Road
          Palo Alto, CA 94304 USA 
          Phone: 650-812-4228 ; FAX: 650-812-4471 ;

CHES'2000, Workshop on Cryptographic Hardware and Embedded Systems, Worcester Polytechnic Institute, Worcester, Massachusetts, USA., August 17-18, 2000.   [posted here 2/4/00]
The focus of this workshop is on all aspects of cryptographic hardware and embedded system design.  Of special interest are contributions that describe new methods for efficient hardware implementations and high-speed software for embedded systems. The topics of interest include but are not limited to:
          * Computer architectures for public-key cryptosystems
          * Computer architectures for secret-key cryptosystems
          * Reconfigurable computing and applications in cryptography
          * Cryptographic processors and co-processors
          * Modular and Galois field arithmetic architectures
          * Tamper resistance on the chip and board level
          * Architectures for smart cards
          * Tamper resistance for smart cards
          * Efficient algorithms for embedded processors
          * Special-purpose hardware for cryptanalysis
          * Fast network encryption
          * True and pseudo random number generators
If you want to receive emails with subsequent Call for Papers and registration information, please send a brief mail to  Complete instructions for authors can be found on the workshop web page at www.ece.WPI.EDU/Research/crypt/ches.  You may also contact the Program Chairs Cetin Kaya Koc (Koc@ece.orst,  +1 541 737 4853) or  Christof Paar (, +1 508 831 5061).

USENIX, 9th USENIX Security Symposium, Denver, Colorado, USA, August 14-17, 2000.  [posted here: 9/20/99].
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in security and applications of cryptography. Please see the conference web site at for more information on the symposium, a detailed list of topics of interest, and the procedure for submitting a paper. 

SAC'2000, Seventh Annual Workshop on Selected Areas in Cryptography, August 14-15, 2000, Waterloo, Ontario, Canada.  [posted here 3/20/00]
Workshop Themes:    -  Design and analysis of symmetric key cryptosystems.
   -  Primitives for private key cryptography, including block and stream ciphers, hash functions and MACs.
   -  Efficient implementations of cryptographic systems in public and private key cryptography.
   -  Cryptographic solutions for web/internet security.

Details on submitting a paper are given on the conference web page at

4th International Workshop on Discrete Algorithms and Methods for Mobile Computing & Communications,  Boston, Massachusetts, USA, August 11, 2000. In conjunction with ACM MobiCom 2000.   [posted here 1/27/00].
The introduction of mobility raises a number of new research issues. This workshop is devoted to discrete algorithms and methods in the context of mobile and wireless computing and communications. Contributions are solicited in all areas related to mobile computing and communications where discrete algorithms and methods are utilized, including, but not limited to: 
             * distributed algorithms frequency allocation 
             * scheduling location tracking 
             * site allocation multi-hop packet radio networks 
             * wireless networks synchronization 
             * cryptography and security error correcting codes 
             * handover (handoff) telecommunications 
             * modeling optimization 
             * routing satellite communication 
Instructions for submitting a paper or a panel proposal are given on the conference web page at  Since deadlines overlap, dual submission of papers to MobiCom and DIALM is encouraged. Any paper accepted for MobiCom will automatically be removed from consideration for DIALM. 

MSWiM'2000, Third ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems, in conjunction with MobiCom 2000, August 6-11, 2000, Boston, MA, USA.   [posted here 4/22/00]
This workshop will focus on all aspects of wireless systems, particularly modeling analysis and simulation in wireless communication. In its third year, the 2000 International ACM Workshop on Modeling and Simulation of Wireless and Mobile Systems, will take place in Boston, MA, just after the International Conference on Mobile Computing and Networking (MobiCom 2000) to be held in Boston, August 6-11, 2000. This is an excellent opportunity to partake in two events covering a wide range of research in wireless and mobile systems. Authors are encouraged to submit both theoretical and practical results of significance. Demonstration of new tools/simulation languages are very welcome.  A complete list of topics of interest, along with directions for submitting a paper are given on the workshop web page at:

RBAC'2000  Fifth ACM Workshop on Role-Based Access Control, Technical University of Berlin, Berlin, Germany, July 26-28, 2000.  [posted here 1/27/00]
The ACM workshops on RBAC bring together researchers, developers, and practitioners to discuss the application of RBAC to both traditional and emerging systems and the development of new modeling paradigms for future applications. The workshop invites participation from the database, network, distributed systems, operating systems, security and application communities.  See the workshop web page at for information on submitting a paper or panel proposal. 

FMCS'2000  Workshop on Formal Methods and Computer Security, Chicago, Illinois, USA, July 20, 2000.  [posted here March 13, 2000]
Computer security protocols are notoriously difficult to get right.  Surprisingly simple problems with some well known protocols have been found years after the original protocol was published and extensively analyzed. Our workshop goal is to bring together the formal methods and security communities.  Security is a current hot topic in the formal methods community, and we hope that this workshop can help focus these energies. Topics of interest include descriptive techniques (specification languages, models, logics) and analysis techniques (model checking, theorem proving, and their combination), as applied to protocols for authentication, fair exchange, electronic commerce, and electronic auctions. However, this list is not exclusive. We particularly want to hear about new approaches, new problems, new security properties, and new protocol bugs. Reports on work in progress are welcome. The program of the workshop will include a keynote address by Doug Tygar, a number of technical sessions (with talks of about 15-20 minutes duration), and a panel discussion.  An extended abstract (about 5-10 pages) explaining recent research results or work in progress should be mailed electronically to, to be received by April 14, 2000. More information can be found at the conference web site at 


PODC'2000, Nineteenth Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, Portland, Oregon, USA, July 16-19, 2000. [posted here: 8/30/99].
Research contributions on the theory, design, specification, implementation or application of distributed systems are solicited. This year PODC will be held in conjunction with a workshop on middleware (information concerning the workshop will be posted on the PODC web site once it is available). In light of this, PODC especially encourages papers addressing distributed computing issues in building and using middleware. Topics of interest include, but are not limited to:  

       * distributed algorithms and their complexity,
      * specification, semantics and verification of distributed systems,
      * issues relating to the design and use of middleware platforms,
      * fault tolerance of distributed systems,
      * cryptographic and security protocols for distributed systems,
      * mobile computing,
      * distributed computing issues in the Internet, including the Web,
      * communication network protocols and architectures,
      * multiprocessor/cluster architectures and algorithms,
      * distributed operating systems and databases,
      * consistency conditions, concurrency control and synchronization,
      * distributed object-oriented computing.
Conference presentations will have two formats: "Regular presentations" of approximately 25 minutes accompanied by papers of up to 10 pages in the proceedings, and "Brief announcements" of approximately 10 minutes accompanied by one page abstracts in the proceedings. Details on the conference and submission procedure can be found on the conference web site at, or contact the program chair, Jim Anderson, by email,, or phone, 1-919-962-1757. 

ACISP'2000, Fifth Australasian Conference on Information Security and Privacy, Brisbane, Australia, July 10-12, 2000. [posted here 9/13/99]
Papers pertaining to all aspects of information security and privacy are solicited. Papers may present theory, techniques, applications and practical experiences on any relevant topic including: authentication and identification, database security, mobile communications security, secure operating systems, security and cryptography policy, security management, commercial applications, key management and auditing, secure electronic commerce, security architectures and models, distributed system security, evaluation and certification, cryptology, access control, network security, smart cards, risk assessment and copyright protection. Please see the conference web page at for details. 

WITS'2000, Workshop on Issues in the Theory of Security, Geneva, Switzerland, July 7-8, 2000   [posted here January 27, 2000]
The members of The IFIP WG 1.7 on "Theoretical Foundations of Security Analysis and Design" will hold their annual workshop as an open event to which all researchers working on the theory of computer security are invited. The W/S will be co-located with ICALP '00 ( Its program will encourage discussions by all attendees, both during and after scheduled presentations on participants' ongoing work.  Topics of interest include:

* formal definition and verification of the various aspects of security:  confidentiality,   integrity, authentication and availability;

new theoretically-based techniques for the formal analysis and design of cryptographic protocols and their manifold applications (e.g., electronic commerce);

* information flow modeling and its application to the theory of confidentiality policies,
* composition of systems, and covert channel analysis;
* formal techniques for the analysis and verification of mobile code;
* formal analysis and design for prevention of denial of service.

Details on the conference and submission procedure can be found on the conference web site at, or contact the program chair, Pierpaolo Degano, by email,, or phone, +39 050 887257, or fax, +39 050 887226.

IRISH2000 4th Irish Workshop on Formal Methods National University of Ireland, Maynooth, July 5-6, 2000.  [posted here 5/29/2000]
The fourth in a series of annual Irish Workshops on Formal Methods will be held in the National University of Ireland, Maynooth.  We are now seeking submissions of work in progress papers in the area of formal methods, theoretical computer science, and mathematics covering the topics listed above. There will be opportunity for these papers to be submitted and reviewed as full papers, after the workshop has completed. For the theoretical day the Programme Committee seeks submissions of papers in the general area of formal methods, theoretical computer science, and mathematics, covering, but not restricted to, the following topics: formal systems, proof systems, mathematical models of computing, semantics, tools, industrial and teaching experiences.  For the industrial day it is planned to offer industry-oriented tutorials. The idea is that these will provide an introduction to formal methods, and be tailored to meet specific needs.  The conference web site is at

CSFW-13, 13th IEEE Computer Security Foundations Workshop, Cambridge, England, July 3-5, 2000.  [posted here: 11/10/99].
This workshop series brings together researchers in computer science to examine foundational issues in computer security. We are interested both in new results in theories of computer security and also in more exploratory presentations that examine open questions and raise fundamental concerns about existing theories. Both papers and panel proposals are welcome. Possible topics include, but are not limited to:

*Access Control *Authentication *Data and System Integrity

*Database Security *Network Security *Distributed Systems Security

*Anonymity *Privacy *Security for Mobile Computing

*Security Protocols *Security Models *Formal Methods for Security

*Information Flow *Executable Content

Workshop attendance is limited to about 40 participants. Complete instructions for submitting a paper or panel proposal are provided on the workshop web page at 



IC'2000, Special session at IC'2000, the First International Conference on Internet Computing, Monte Carlo Resort, Las Vegas, Nevada, USA, June 26-29, 2000.  [posted here 2/15/00]
This special session, New Paradigms in Computer Security, at IC'2000 is to present recent advances in computer system security. The main focus will be on new approaches for less vulnerable program generation and intrusion detection.  Papers are solicited on the topic areas include, but are not limited to:

* Analysis tools

* Cases in Practice

* Course or Lab development

* Distributed System Architecture

* Emerging Curricula

* Intrusion Detection System  Integration

* IDS in distributed client-server computing

* Processor and Software Architecture

 * Standards



Submit extended abstracts in PDF or postscript format, limited to 1200 words in length, to The due date for the extended abstract is March 17, 2000.  For more information on IC'2000, visit the conference web site at



FIRST'2000, The 12th Annual FIRST Conference on Computer Security and Incident Handling, Chicago, Illinois, USA, June 25-30, 2000.  [posted here: 10/27/99].
The Forum of Incident Response and Security Teams (FIRST, ) brings security incident response teams together including government, commercial, and academic organizations. The conference is a five day event, two days of tutorials and three days of technical sessions including refereed paper presentations, invited talks, and panel discussions. The focus of the FIRST'2000 conference is on the most recent practical advances in computer security in all its aspects. The Program Committee is soliciting original papers analyzing, among other topics, methodologies for drafting security policies, recent intrusion techniques, describing experiences in building incident response capabilities, working security architectures, pros and cons of both commercial and experimental pro-active security tools. The deadline for submissions is NOVEMBER 15, 1999. The full call for papers is at


CITSS12  Canadian Information Technology Security Symposium,
Ottawa, Canada, June 19-23, 2000.  [posted here 5/29/00]

We invite you to attend Building Trust for a Secure Global Economy, the 12th Annual Information Technology Security Symposium. This annual event is sponsored by the Communications Security Establishment (CSE), a Canadian Federal Government lead agency responsible for information technology security. This year's symposium takes you inside some of the most important security issues facing businesses and governments today. CSE's weeklong symposium features one and a half days of tutorials, a one-day plenary session and more than 36 in depth presentations
by Canadian and international experts in their fields. An industry leading vendor trade show with more than 40 booths completes the program. Presentations will focus on:
     - PKI issues and solutions 
     - e-commerce/e-business
     - Critical Information Infrastructure Protection 
     - Intrusion detection
     - Security in open source software
More info on the symposium web page at


20th Biennial Symposium on Communications, Department of Electrical and Computer Engineering, Queen's University, Kingston, Ontario, Canada, May 28-31, 2000.   [posted here: 2/8/2000]. 

This symposium is intended to provide a forum for engineers and researchers in the area of communications and signal processing.  Original papers are encouraged from new areas of research on communications, as well as those traditionally associated with this conference.  A complete list of topics of interest (which includes cryptography and security) as well as submission instructions is provided on the conference web page at



NCISSE'2000 Fourth Colloquium for Information Systems Security Education, Washington D.C., USA, May 23-25, 2000.  (Papers due March 29, 2000)  [posted here February 12, 2000]
It is the task of American higher education to provide an information-literate work force and to prepare information technology professionals. To meet this urgent need, higher education must be informed of the knowledge, skills and attitudes to be taught in the general curricula and in the information curricula of its colleges and universities. Industry and government must understand their role in supporting higher education, not simply expecting higher education to be responsive and informed about information security and assurance. The National Colloquium for Information Systems Security Education (the Colloquium) is established to serve as a living body to bring government, industry and academia together to meet those challenges.  This year the colloquium introduces two paper tracks, one general submission, the other restricted to student participation. The papers in both tracks should discuss course or lab development, INFOSEC curricula, standards, existing or emerging programs, and related issues. This year, we are particularly interested in addressing the question, "what is academia’s response to the shortfall of INFOSEC workers?"  To achieve this goal, we are particularly interested in topics such as the following:

*  Assessment of need for information security workers/researchers/faculty  

*  Integrating information assurance topics in existing curricula  

*  Experiences with course or laboratory development  

*  Alignment of curriculum with existing information assurance education standards

*  Emerging programs or centers in information assurance  

* Late breaking topics (see the complete call for papers)  


Papers which fall into the topic areas outlined above are particularly welcome, although contributions outside those topics may also be of interest.  See the complete call for papers for more information on submitting a paper, and the conference web site at for general information on the colloquium. 


ICCC  First International Common Criteria Conference, Baltimore, Maryland, USA, May 23-25, 2000.  [posted here January 27, 2000].
The ICCC will bring together the signatories to the Mutual Recognition Arrangement, their national implementation scheme administrators, accredited commercial testing laboratories, producers and consumers of information technology products, acquisition authorities and information assurance professionals from government, industry and academia throughout the world. There will be four tracks at the ICCC geared towards providing you with the most up to date, accurate and complete information on the Common Criteria process. Track A will focus on general information about the Common Criteria testing programs in countries around the world. Track B will take a more technical approach suited for evaluators, certifiers or validators looking for detailed technical information on the specifics of testing under the Common Criteria. Track C will look at the latest protection profiles and the types of tools and documents available to help you use the Common Criteria more effectively. Track D will be a tutorial for those wanting to become more familiar with the Common Criteria, the Common Evaluation Methodology and the Common Criteria Toolbox. For more detailed information on the ICCC or to register for the conference, visit the National Information Assurance Partnership (NIAP) web site: For information on the vendor exhibits to be held in conjunction with the ICCC on May 23 and 24, contact Janin Hardin or Stephanie King at the Federal Business Council, (800) 878-2940 or log on to:

S&P'2000,2000 IEEE Symposium on Security and Privacy, Oakland CA, USA, May 14-17, 2000.  [posted here: 8/17/99].
See the full CFP above or on the Cipher Web page or at

WWW9, 9th International World Wide Web Conference, Amsterdam, The Netherlands, May 15-19, 2000.   [posted here: 8/17/99].
Topics: E-Commerce, XML, Multimedia, Web Server Performance, Searching and Querying, Protocols, Web Document Management, Java, Web Site Design, Web Security, RDF, Database and Directory Services, Collaboration, Accessibility, Metadata, New Languages Submitted papers should present original reports of substantive new work in areas that can be theoretical (models, analyses, techniques, semantics), empirical (experiments, case studies), or implementation-oriented (new systems, tools, methodologies, user interfaces). Tutorial proposals are desired for both half-day and full-day sessions on topics of current relevance to Web design, services, operation, and use. Subjects of interest include XML, DOM, Multimedia, E-commerce, Java, Dynamic HTML, Security, Accessibility, Graphics and the Web, and other areas expected to be of special interest in spring 2000. WWW9 workshops are intended to provide a forum for highly interactive discussion on focused topics. Workshop proposals should address current web-related issues which can benefit from small-group information exchange and discussion. Attendance at workshops will be limited. Submission details are available at

MFPS, The Sixteenth Workshop on the Mathematical Foundations of Programming Semantics, Stevens Institute of Technology, Hoboken, NJ, USA, April 13-16, 2000. [posted here 11/4/99].
The MFPS conferences are devoted to those areas of mathematics, logic and computer science which are related to the semantics of programming languages. The series particularly has stressed providing a forum where both mathematicians and computer scientists can meet and exchange ideas about problems of common interest. We also encourage participation by researchers in neighboring areas, since we strive to maintain breadth in the scope of the series. The invited speakers for MFPS 16 are:
                     Samson Abramsky University of Edinburgh
                     Rance Cleaveland Stony Brook
                     Andy Gordon Microsoft Cambridge
                     Robin Milner University of Cambridge
                     Peter O'Hearn Queen Mary - Westfield
                     Dana Scott CMU
In addition to the invited talks, there will be special sessions devoted to security and model checking. Those interested in contributing a talk at the meeting should send a title and short abstract to The available slots will be allocated on a first come, first served basis. As with other MFPS workshops, the Proceedings for MFPS 16 will consist of a special issue of the journal Theoretical Computer Science. All participants at the meeting (whether they present a talk or not) will be invited to submit a paper for the Proceedings; these submissions will be refereed to the usual TCS standards. Additional information available at or from

AES3, Third Advanced Encryption Standard (AES) Candidate Conference, New York, New York, USA, April 13-14, 2000. (Submissions due: January 15, 2000) [posted here: 9/23/99]
In the summer of 1999, NIST began Round 2 of the technical analysis of five candidate algorithms that have been selected as finalists for the AES development effort. Near the end of Round 2, the 3rd AES Candidate Conference (AES3) will focus on discussion of the technical resuts of Round 2 and views on candidates for Round 3. A complete call-for-papers is given on the conference web page at

CFP'2000, Computers, Freedom, and Privacy. CFP 2000 Challenging the Assumptions, Toronto, Ontario, Canada, April 4-7, 2000.  [posted here 8/17/99].
The theme of the tenth CFP conference is 'Challenging the Assumptions'. After a decade of CFP conferences, it's time to examine what we have learned. At CFP2000 we want to re-examine the assumptions we have been making and consider which ones still make sense as we move forward. Proposals are welcomed on all aspects of computers, freedom, and privacy. We strongly encourage proposals that challenge the future, tackle the hard questions, look at old issues in new ways, articulate and analyze key assumptions, and present complex issues in all their complexity. We are seeking proposals for tutorials, plenary sessions, workshops, and birds-of-a-feather sessions. We are also seeking suggestions for speakers and topics. Sessions should present a wide range of thinking on a topic by including speakers from different viewpoints. Complete submission instructions appear on the CFP2000 web site at

IETF March 27-31, 2000, 47th IETF, Adelaide, Australia
[from the IETF Web page at
The Internet Engineering Task Force (IETF) is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet. It is open to any interested individual. The actual technical work of the IETF is done in its working groups, which are organized by topic into several areas (e.g., routing, transport, security, etc.). Much of the work is handled via mailing lists. The IETF holds meetings three times per year. Future IETF Meeting Sites:


Summer 1999 - 45th IETF, July 12-16, 1999, Oslo, Norway, Host: Uninett


Fall 1999 - 46th IETF, November 8-12, 1999, Washington, DC, Host: Nortel


March 2000 - 47th IETF, March 27-31, 2000, Adelaide, Australia, Host: Sellnet and

OPENARCH'2000, The Third IEEE Conference on Open Architectures and Network Programming, Tel Aviv, Israel, March 26-27, 2000. [posted here: 12/6/99]
The Third IEEE Conference on Open Architectures and Network Programming invites participation in this international forum on open programmable networks. Advances in open signaling and control, active networks, mobility management, transportable software, Web-based services access, and distributed systems technologies are driving a reexamination of existing network software architectures and the evolution of control and management systems away from traditional constrained solutions. OPENARCH 2000 will foster a better understanding of network software architecture and the techniques becoming available to make it simpler, more flexible, and more robust. In the spirit of the first and second conferences, OPENARCH 2000 will provide researchers and developers with a focused opportunity to present and discuss current work and future directions in the systems, techniques, and performance of open architectures. More information can be found on the conference web page at

FC'2000, Fourth Annual International Conference on Financial Cryptography, Anguilla, British West Indies, February 21-24, 2000. [posted here: 12/6/99]
The annual Financial Cryptography conference is organized by the International Financial Cryptography Association (IFCA) to explore all aspects of cryptography for financial applications. The conference has international participation from business, legal and technology communities. For more information, see the conference web page at

NDSS'2000 Network and Distributed System Security Symposium San Diego, California, USA, February 2-4, 2000. [posted here: 2/20/99]
Technical papers and panel proposals are invited for the Internet Society's Year 2000 Network and Distributed System Security Symposium (NDSS 2000), tentatively scheduled for 2-4 February 2000 in San Diego, California. The symposium will foster information exchange among researchers and practitioners of network and distributed system security services. The audience includes those who are interested in the practical aspects of network and distributed system security, focusing on actual system design and implementation rather than theory. A major goal of the symposium is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technology. Proceedings will be published by the Internet Society. A best paper award will be presented at the symposium to the authors of the best paper to be selected by the program committee. The deadline for electronic submission is 16 JUNE 1999. The complete call is available at