Milan, Italy - September 14-16, 2005 (submissions due March 25, 2005)

Papers offering novel research contributions in any aspect of computer 
security are solicited for submission to the Tenth European Symposium 
on Research in Computer Security (ESORICS 2005). Organized in a series 
of European countries, ESORICS is confirmed as the European research 
event in computer security. The symposium started in 1990 and has been 
held on alternate years in different European countries and attracts 
an international audience from both the academic and industrial 
communities. From 2002 it has been held yearly. The Symposium has 
established itself as one of the premiere, international gatherings on 
information assurance. Papers may present theory, technique, 
applications, or practical experience on topics including: 
- access control                    
- accountability                    
- anonymity                         
- applied cryptography              
- authentication                    
- covert channels                   
- cryptographic protocols          
- cybercrime                        
- data and application security     
- data integrity                    
- denial of service attacks          
- dependability                     
- digital right managament          
- firewalls                           
- formal methods in security        
- identity management       
- inference control                 
- information dissemination control 
- information flow control          
- information warfare              
- intellectual property protection                                        
- intrusion tolerance      
- language-based security
- network security 
- non-interference 
- peer-to-peer security 
- privacy-enhancing technology
- pseudonymity 
- secure electronic commerce 
- security administration 
- security as quality of service 
- security evaluation 
- security management 
- security models 
- security requirements engineering 
- security verification 
- smartcards
- steganography
- subliminal channels 
- survivability
- system security
- transaction management
- trust models and trust management policies 
- trustworthy user devices 

The primary focus is on high-quality original unpublished research, 
case studies and implementation experiences. We encourage submissions 
of papers discussing industrial research and development. Proceedings 
will be published by Springer-Verlag in the Lecture Notes in Computer 
Science series. 

More information about the conference can be found at