6th Workshop on Privacy Enhancing Technologies Robinson College, Cambridge, United Kingdom June 28 - June 30, 2006 C A L L F O R P A P E R S http://petworkshop.org/2006/ Important Dates: Paper submission: March 3, 2006 Notification of acceptance: May 1, 2006 Camera-ready copy for preproceedings: June 2, 2006 Camera-ready copy for proceedings: July 28, 2006 Colocated with: * The Privacy Technology: Executive Briefing, 2006 Robinson College, Cambridge, June 28 - June 29, 2006 * The Workshop on the Economics of Information Security (WEIS06) Robinson College, Cambridge, June 26 - June 27, 2006 ----------------------------------------------------------------------- Privacy and anonymity are increasingly important in the online world. Corporations, governments, and other organizations are realizing and exploiting their power to track users and their behavior. Approaches to protecting individuals, groups, but also companies and governments from profiling and censorship include decentralization, encryption, distributed trust, and automated policy disclosure. This 6th workshop addresses the design and realization of such privacy services for the Internet and other communication networks by bringing together anonymity and privacy experts from around the world to discuss recent advances and new perspectives. The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems. We encourage submissions from other communities such as law and business that present their perspectives on technological issues. As in past years, we will publish proceedings after the workshop in the Springer Lecture Notes in Computer Science series. Suggested topics include but are not restricted to: * Anonymous communications and publishing systems * Censorship resistance * Pseudonyms, identity management, linkability, and reputation * Data protection technologies * Location privacy * Privacy in Ubiquitous Computing Environments * Policy, law, and human rights relating to privacy * Privacy and anonymity in peer-to-peer architectures * Economics of privacy * Fielded systems and techniques for enhancing privacy in existing systems * Protocols that preserve anonymity/privacy * Privacy-enhanced access control or authentication/certification * Privacy threat models * Models for anonymity and unobservability * Attacks on anonymity systems * Traffic analysis * Profiling and data mining * Privacy vulnerabilities and their impact on phishing and identity theft * Deployment models for privacy infrastructures * Novel relations of payment mechanisms and anonymity * Usability issues and user interfaces for PETs * Reliability, robustness and abuse prevention in privacy systems Stipends to attend the workshop will be made available, on the basis of need, to cover travel expenses, hotel, or conference fees. You do not need to submit a technical paper and you do not need to be a student to apply for a stipend. For more information, see http://petworkshop.org/2006/stipends.html General Chair: To be confirmed Program Chairs: George Danezis (George.Danezis@cl.cam.ac.uk), University of Cambridge, UK Philippe Golle (firstname.lastname@example.org), Palo Alto Research Center (PARC) Program Committee: Alessandro Acquisti, Heinz School, Carnegie Mellon University, USA Mikhail Atallah, Purdue University, USA Michael Backes, IBM Zurich Research Laboratory, Switzerland Alistair Beresford, University of Cambridge, UK Nikita Borisov, University of California at Berkeley, USA Jan Camernish, IBM Zurich Research Laboratory, Switzerland Kim Cameron, Microsoft, USA Fred Cate, Indiana University at Bloomington, USA Roger Dingledine, The Free Haven Project, USA Hannes Federrath, University of Regensburg, Germany Simone Fischer, Karlstad University, Sweden Ian Goldberg, Zero Knowledge Systems, Canada Markus Jakobsson, Indiana University at Bloomington, USA Dennis Kugler, Federal Office for Information Security, Germany Brian Levine, University of Massachusetts at Amherst, USA David Martin, University of Massachusetts at Lowell, USA David Molnar, University of California at Berkeley, USA Andreas Pfitzmann, Dresden University of Technology, Germany Mike Reiter, Carnegie Mellon University, USA Andrei Serjantov, The Free Haven Project, UK Paul Syverson, Naval Research Lab, USA Matthew Wright, University of Texas at Arlington, USA Papers should be at most 15 pages excluding the bibliography and well-marked appendices (using an 11-point font), and at most 20 pages total. Submission of shorter papers (from around 4 pages) is strongly encouraged whenever appropriate. Papers must conform to the Springer LNCS style. Follow the "Information for Authors" link at http://www.springer.de/comp/lncs/authors.html. Reviewers of submitted papers are not required to read the appendices and the paper should be intelligible without them. The paper should start with the title, and an abstract. The introduction should give some background and summarize the contributions of the paper at a level appropriate for a non-specialist reader. Submitted papers should be anonymized by removing or sanitising author names, affiliations, acknowledgments, and obvious self-references. A preliminary version of the proceedings will be made available to workshop participants. Final versions are not due until after the workshop, giving the authors the opportunity to revise their papers based on discussions during the meeting. Submit your papers in Postscript or PDF format. To submit a paper, compose a plain text email to email@example.com containing the title and abstract of the paper, the authors' names, email and postal addresses, phone and fax numbers, and identification of the contact author (to whom we will address all subsequent correspondence). Attach your submission to this email and send it. By submitting a paper, you agree that if it is accepted, you will sign a paper distribution agreement allowing for publication, and also that an author of the paper will register for the workshop and present the paper there. Our current working agreement with Springer is that authors will retain copyright on their own works while assigning an exclusive 3-year distribution license to Springer. Authors may still post their papers on their own Web sites. See http://petworkshop.org/2004/paper-dist-agreement-5-04.html for the 2004 version of this agreement. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Paper submissions must be received by March 3. We acknowledge all submissions manually by email. If you do not receive an acknowledgment within a few days (or one day, if you are submitting right at the deadline), then contact the program committee chairs directly to resolve the problem. Notification of acceptance or rejection will be sent to authors no later than May 1 and authors will have the opportunity to revise for the preproceedings version by June 2. We also invite proposals of up to 2 pages for panel discussions or other relevant presentations. In your proposal, (1) describe the nature of the presentation and why it is appropriate to the workshop, (2) suggest a duration for the presentation (ideally between 45 and 90 minutes), (3) give brief descriptions of the presenters, and (4) indicate which presenters have confirmed their availability for the presentation if it is scheduled. Otherwise, submit your proposal by email as described above, including the designation of a contact author. The program committee will consider presentation proposals along with other workshop events, and will respond by the paper decision date with an indication of its interest in scheduling the event. The proceedings will contain 1-page abstracts of the presentations that take place at the workshop. Each contact author for an accepted panel proposal must prepare and submit this abstract in the Springer LNCS style by the "Camera-ready copy for preproceedings" deadline date. ----------------------------------------------------------------------- Privacy Technology: Executive Briefing, 2006 Solving the Identity Theft Problem Once: and For All. Identity theft is a multi-stage process that begins with organizational loss of control over the personal information it manages and ends in the corrosion of trust necessary for e-commerce, e-business, and e-government. On the way, stock prices fall, media interest increases, legislative responses get brandished and all too often people's lives are spun into financial and legal chaos.This year's executive outreach will bring forward the mix of research and solutions necessary to minimise and eliminate identity theft. It will focus on enterprise solutions and the necessary technologies that will directly attack identity theft. Identity theft has become a catch-all for various security breeches, fraud, social engineering and organisational naivete.The Executive Briefing will first provide an analysis of types of identity theft and the policy, legislative and technology vulnerabilities that foster identity theft. The briefing will then focus on the solutions at all levels, bringing together a critical mass of the world's experts in identity protection. The briefing will be higly interactive to ensure that executives will be able to take away the answers to their identity theft problems as well as have direct exposure to identity theft research, solutions and the experts behind them. The Privacy Technology Executive Briefing is an annual event allied with the Privacy Enhancing Technology Workshop and is geared to providing the leading edge solutions to the most pressing privacy problems faced by senior executives. $500 USD buys you a seat, but you will only need the edge.