Twenty-second European Symposium on Research in Computer Security, 
Oslo, Norway, 
September 11-15, 2017. 
(Submissions due 19 April 2017) 

This symposium, the annual European research event in Computer
Security, started in 1990 and has been held in several European
countries, attracting a wide international audience from both the
academic and industrial communities. Papers offering novel research
contributions in computer security are solicited for submission to the
Symposium. The primary focus is on original, high quality, unpublished
research and implementation experiences. We encourage submissions of
papers discussing industrial research and development.

Topics of interest include, but are not limited to:

* access control
* accountability
* ad hoc networks
* anonymity
* applied cryptography
* authentication
* biometrics
* data and computation integrity
* database security
* data protection
* digital content protection
* digital forensics
* distributed systems security
* embedded systems security
* inference control
* information hiding
* identity management
* information flow control
* information security governance and management
* intrusion detection
* formal security methods
* language-based security
* network security
* phishing and spam prevention
* privacy
* privacy preserving data mining
* risk analysis and management
* secure electronic voting
* security architectures
* security economics
* security metrics
* security models
* security and privacy for big data
* security and privacy in cloud scenarios
* security and privacy in complex systems
* security and privacy in content centric networking
* security and privacy in crowdsourcing
* security and privacy in the IoT
* security and privacy in location services
* security and privacy for mobile code
* security and privacy in pervasive / ubiquitous computing
* security and privacy policies
* security and privacy in social networks
* security and privacy in web services
* security and privacy in cyber-physical systems
* security, privacy and resilience in critical infrastructures
* security verification
* software security
* systems security
* trust models and management
* trustworthy user devices
* usable security and privacy
* web security
* wireless security

For more information, please see