(Extracted from the Cipher Calls For Papers list)
(June 2000 - December 2000)
The 2nd International Workshop on Networked Group Communication, Stanford
University, Palo Alto, California, USA, November 8-10, 2000. (papers due
June 5, 2000)
The aim of the Workshop is to allow researchers and practioners to present the design and implementation techniques for networked group communication. The focus of the Workshop is strictly on multicast and networked group communication. This Workshop is the second and only international event in this area (first workshop was in Pisa, Italy, in November 1999). Authors are invited to submit papers on any issue related to networked group communication, including but not limited to:
- multicast congestion control
- multicast routing, naming, address allocation
- scalability in multicast services
- reliable and semi-reliable multicast protocols
- novel multicast architectures
- multicast security
- multicast deployment related issues
- multicast over heterogeneous media
- multipeer applications (distributed interactive apps, games, DIS)
- QoS issues with multicast
- Pricing and economic model for multicast traffic
- group management techniques
- network engineering for multicast services
Information on submission of papers, along with additional information on the conference can be found at the conference web site at www.cs.ucsb.edu/ngc2000
2000 The 20th Conference on the Foundations of Software
Technology and Theoretical Computer Science, New Delhi, India, December 13-15,
2000. (paper deadline extended to June 6, 2000)
This annual conference provides a platform for presentation of original research results in fundamental aspects of computer science. It also provides an excellent forum for meeting and exchanging ideas with people who are at the frontline of software technology and theoretical computer science. The Conference Proceedings will be published by Springer-Verlag in the series Lecture Notes in Computer Science (LNCS). Previous proceedings appeared as LNCS Volumes: 880, 1026, 1180, 1346, 1530, 1738. A list of topics of interest along with detailed instructions for submitting a paper can be found at the conference web site at www.cse.iitd.ernet.in/~fsttcs20/
Protocols for Multimedia Systems, Cracow, Poland, October 22-25, 2000.
(papers due June 26, 2000)
The PROMS2000 conference is intended to contribute to a scientific, strategical and practical cooperation between research institutes and industrial companies in the area of distributed multimedia applications, protocols, and intelligent management tools, with emphasis on their provision over broadband networks. An extensive list of topics of interest, along with instructions for submitting a paper, can be found on the conference web page at PROMS2000.kt.agh.edu.pl/
Fifth Nordic Workshop on Secure IT Systems - Encouraging Co-operation,
Reykjavik, Iceland, October 12-13, 2000. (Submissions due: August 1, 2000)
The NORDSEC workshops were started in 1996 with the aim to bring together researchers and practitioners within IT security in the Nordic countries. These workshops have remained a forum for co-operation between the Nordic research organizations, industry and the computer societies. The emphasis of the workshop is to encourage interchange and cooperation between the research community and the industrial and software development community. The theme of the workshop is applied security, i.e., all kinds of security issues for all kinds of information technology systems. We are in particular looking for contributions that deal with technology transfer and application of research in development. Furthermore, this year's NORDSEC will look more specifically at several Special Topics that are closely related to Computer Security, but are not often discussed in the same forum: Software Engineering, Virus Protection, and Privacy Protection. Details are to be found on the conference website at www.ru.is/nordsec2000/
The Internet Society 2001 Network and Distributed System Security Symposium,
Catamaran Resort, San Diego, California, February 7-9, 2001. (Papers due: August
This symposium will foster information exchange among researchers and practioners of network and distributed system security services. The intended audience includes those who are interested in the practical aspects of network and distributed system security, focusing on actual system design and implementation, rather than theory. A major goal of the symposium is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technology. The proceedings of the symposium will be published by the Internet Society. The Program Committee invites both technical papers and panel proposals. Submissions are solicited for, but are not limited to, the following topics:
* Secure Electronic Commerce.
* Intellectual Property Protection.
* Network security policies.
* Integrating Security in Internet protocols.
* Attack-resistant protocols and services.
* Special problems and case studies.
* Security for collaborative applications and services.
* Fundamental security services.
* Supporting mechanisms and APIs.
* Integrating security services with system and application security facilities and protocols.
* Security for emerging technologies.
* Intrusion Avoidance, Detection, and Response.
* Network Perimeter Controls.
* Virtual Private Networks.
Submissions must be received by August 2, 2000. Complete submission information can be found at www.isoc.org/ndss01/cfp. Dates, final call for papers, advance program, and registration information are available at www.isoc.org/ndss01.
The Fifth International Symposium on Autonomous Decentralized Systems, Dallas,
Texas, USA, March 26-28, 2001. (Papers and panel proposals due August 15,
Driven by the continuous growth in the power, intelligence and openness of computer, communication and control technologies, possibilities and opportunities for realizing highly efficient and dependable business and control systems have been steadily increasing. Dynamically changing social and economic situations demand next-generation systems based on emerging technologies and applications. Such systems are expected to have the characteristics of living systems composed of largely autonomous and decentralized components. Such systems are called Autonomous Decentralized Systems (ADS). While ISADS 2001 will primarily focus on advancements and innovation in ADS concept, technologies, and applications related to the increasingly important topic of Electronic Commerce, other themes such as telecommunications and heterogeneous system and application integration will also be included. The scope of discussions on ADS shall include, but not be limited to:
* Computer and communication architectures / intelligent network /Internet;
* Heterogeneous distributed information / control systems;
* Mobile agent /computer-supported cooperative works;
* Distributed software development and maintenance;
* Assurance, fault tolerance and on-line expansion;
* Object management architecture /design pattern / application frameworks;
* Emergent control and robotic systems;
* Novel applications: electronic commerce, telecommunications, information service systems, manufacturing systems, real-time event management, office automation, traffic and
transportation control, logistics systems. See the conference web site at isads.utdallas.edu for complete instructions on submitting a paper or a proposal for a panel session.
FORMAL METHODS EUROPE Formal Methods for Increasing Software Productivity,
Humboldt-Universitaet zu Berlin, Germany, March 12-16, 2001. (Papers,
tutorial and workshop proposals due: August 25, 2000)
FME 2001 is the tenth in a series of symposia organised by Formal Methods Europe, an independent association whose aim is to stimulate the use of, and research on, formal methods for software development. The theme of FME 2001 is Formal Methods for Increasing Software Productivity. This theme recognizes that formal methods have the potential to do more for industrial software development than enhance software quality--they can also increase productivity at many different points in the software life-cycle. The symposium committee is particularly interested in papers on the use of formal methods to
increase productivity, for example on:
* Codifying domain knowledge
* Re-using components
* Automatically generating code and/or documentation
* Improving the efficiency of software testing
* Enhancing analysis techniques for validation and verification
* Exploiting commonalities within product families
* Improving the maintainability and modifiability of software
* Empirical studies of effects on productivity
The symposium committee solicits full-length papers in two broad categories:
1. Use of formal methods, including reports on industrial use, substantial case studies, comparisons among methods, education, and technology transfer.
2. Development of formal methods, including motivating factors, theoretical foundations, extensions, manual procedures, and tool support.
More information about the submission of papers, tutorial and workshop proposals, can be found on the conference web site at www.informatik.hu-berlin.de/top/fme2001
The Fourth IEEE Conference on Open Architectures and Network Programming, Hilton
Anchorage Hotel, Anchorage, Alaska, April 22-23, 2001. (Papers, tutorial
and workshop proposals due: October 1, 2000)
The Fourth IEEE Conference on Open Architectures and Network Programming invites participation in this international forum on active, and programmable networks. Advances in open signaling and control, active networks, mobility management, transportable software, web-based services access, and distributed systems technologies are driving a reexamination of existing network software architectures and the evolution of control and management systems away from traditional constrained solutions. OPENARCH 2001 will foster a better understanding of these new network software architectures and techniques that are making the network interface more flexible and robust. Authors are invited to submit both full and short papers for consideration. Suggested topics include:
- Advances in active networks
- Open and innovative signaling systems
- Programming abstractions and interfaces for networks
- Service creation platforms
- Programming for mobility
- Programming for Quality of Service
- Intelligent agents and trading
- Distributed computing models and algorithms
- Security in an open object world
- Support for multiple control planes
- Control and resource APIs and object representations
- Performance of control architectures
- Experimental architectures and implementation techniques
- Enabling technologies, platforms and languages (CORBA, WWW, Java, ...)
- Reliability of programmable networking technologies
- Modeling of network services
- Programmability support for virtual networks
- Interactive multimedia, multi-party cooperation and groupware
- Pricing and real-time billing
- Secure transactions processing and electronic commerce
- Active networks in telephony
OPENARCH is sponsored by the IEEE Communications Society and will be
co-located and organized in conjunction with INFOCOM 2001. Complete instructions for submissions can be found on the conference web site at www.openarch.org
4th International Information Hiding Workshop, Holiday Inn University Center,
Pittsburgh, PA, USA, April 25-27, 2001 (submissions due December 7, 2000)
[posted here 2/26/00]
Many researchers are interested in hiding information or, conversely, in preventing others from doing so. As the need to protect digital intellectual property grows ever more urgent, this research is of increasing interest to both the academic and business communities. Current research themes include: copyright marking of digital objects, covert channels in computer systems, detection of hidden information, subliminal channels in cryptographic protocols, low-probability-of-intercept communications, and various kinds of anonymity services ranging from steganography through location security to digital elections. Interested parties are invited to submit papers on research and practice which are related to these areas of interest. Further information can be obtained at chacs.nrl.navy.mil/IHW2001 or by contacting the program chair at email@example.com
Conferences and Workshops
(June 2000 - August 2000)
Canadian Information Technology Security Symposium, Ottawa, Canada, June 19-23,
We invite you to attend Building Trust for a Secure Global Economy, the 12th Annual Information Technology Security Symposium. This annual event is sponsored by the Communications Security Establishment (CSE), a Canadian Federal Government lead agency responsible for information technology security. This year's symposium takes you inside some of the most important security issues facing businesses and governments today. CSE's weeklong symposium features one and a half days of tutorials, a one-day plenary session and more than 36 in depth presentations
by Canadian and international experts in their fields. An industry leading vendor trade show with more than 40 booths completes the program. Presentations will focus on:
- PKI issues and solutions
- Critical Information Infrastructure Protection
- Intrusion detection
- Security in open source software
More info on the symposium web page at www.cse-cst.gc.ca/cse/english/annual.html
The 12th Annual FIRST Conference on Computer Security and Incident Handling,
Chicago, Illinois, USA, June 25-30, 2000.
The Forum of Incident Response and Security Teams (FIRST, www.first.org ) brings security incident response teams together including government, commercial, and academic organizations. The conference is a five day event, two days of tutorials and three days of technical sessions including refereed paper presentations, invited talks, and panel discussions. The focus of the FIRST'2000 conference is on the most recent practical advances in computer security in all its aspects. The Program Committee is soliciting original papers analyzing, among other topics, methodologies for drafting security policies, recent intrusion techniques, describing experiences in building incident response capabilities, working security architectures, pros and cons of both commercial and experimental pro-active security tools. The deadline for submissions is NOVEMBER 15, 1999. The full call for papers is at www.first.org/conference/2000.
Special session at IC'2000, the First International Conference on Internet
Computing, Monte Carlo Resort, Las Vegas, Nevada, USA, June 26-29, 2000.
This special session, New Paradigms in Computer Security, at IC'2000 is to present recent advances in computer system security. The main focus will be on new approaches for less vulnerable program generation and intrusion detection. Papers are solicited on the topic areas include, but are not limited to:
* Analysis tools
* Cases in Practice
* Course or Lab development
* Distributed System Architecture
* Emerging Curricula
* Intrusion Detection System Integration
* IDS in distributed client-server computing
* Processor and Software Architecture
Submit extended abstracts in PDF or postscript format, limited to 1200 words in length, to firstname.lastname@example.org. The due date for the extended abstract is March 17, 2000. For more information on IC'2000, visit the conference web site at www.cs.umanitoba.ca/~iwic/.
13th IEEE Computer Security Foundations Workshop, Cambridge, England, July 3-5,
This workshop series brings together researchers in computer science to examine foundational issues in computer security. We are interested both in new results in theories of computer security and also in more exploratory presentations that examine open questions and raise fundamental concerns about existing theories. Both papers and panel proposals are welcome. Possible topics include, but are not limited to:
|*Access Control||*Authentication||*Data and System Integrity|
|*Database Security||*Network Security||*Distributed Systems Security|
|*Anonymity||*Privacy||*Security for Mobile Computing|
|*Security Protocols||*Security Models||*Formal Methods for Security|
|*Information Flow||*Executable Content|
IRISH2000 4th Irish Workshop on Formal Methods National University of Ireland, Maynooth, July 5-6, 2000.
Workshop on Issues in the Theory of Security, Geneva, Switzerland, July 7-8,
The members of The IFIP WG 1.7 on "Theoretical Foundations of Security Analysis and Design" will hold their annual workshop as an open event to which all researchers working on the theory of computer security are invited. The W/S will be co-located with ICALP '00 (cuiwww.unige.ch/~icalp/). Its program will encourage discussions by all attendees, both during and after scheduled presentations on participants' ongoing work. Topics of interest include:
|*||formal definition and verification of the various aspects of security: confidentiality, integrity, authentication and availability;|
new theoretically-based techniques for the formal analysis and design of cryptographic protocols and their manifold applications (e.g., electronic commerce);
|*||information flow modeling and its application to the theory of confidentiality policies,|
|*||composition of systems, and covert channel analysis;|
|*||formal techniques for the analysis and verification of mobile code;|
|*||formal analysis and design for prevention of denial of service.|
Details on the conference and submission procedure can be found on the conference web site at www.dsi.unive.it/IFIPWG1_7/wits2000.html, or contact the program chair, Pierpaolo Degano, by email, email@example.com, or phone, +39 050 887257, or fax, +39 050 887226.
Fifth Australasian Conference on Information Security and Privacy, Brisbane,
Australia, July 10-12, 2000.
Papers pertaining to all aspects of information security and privacy are solicited. Papers may present theory, techniques, applications and practical experiences on any relevant topic including: authentication and identification, database security, mobile communications security, secure operating systems, security and cryptography policy, security management, commercial applications, key management and auditing, secure electronic commerce, security architectures and models, distributed system security, evaluation and certification, cryptology, access control, network security, smart cards, risk assessment and copyright protection. Please see the conference web page at www.isrc.qut.edu.au/acisp2K for details.
Nineteenth Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed
Computing, Portland, Oregon, USA, July 16-19, 2000.
Research contributions on the theory, design, specification, implementation or application of distributed systems are solicited. This year PODC will be held in conjunction with a workshop on middleware (information concerning the workshop will be posted on the PODC web site once it is available). In light of this, PODC especially encourages papers addressing distributed computing issues in building and using middleware. Topics of interest include, but are not limited to:
* distributed algorithms and their complexity,
* specification, semantics and verification of distributed systems,
* issues relating to the design and use of middleware platforms,
* fault tolerance of distributed systems,
* cryptographic and security protocols for distributed systems,
* mobile computing,
* distributed computing issues in the Internet, including the Web,
* communication network protocols and architectures,
* multiprocessor/cluster architectures and algorithms,
* distributed operating systems and databases,
* consistency conditions, concurrency control and synchronization,
* distributed object-oriented computing.
Conference presentations will have two formats: "Regular presentations" of approximately 25 minutes accompanied by papers of up to 10 pages in the proceedings, and "Brief announcements" of approximately 10 minutes accompanied by one page abstracts in the proceedings. Details on the conference and submission procedure can be found on the conference web site at www.podc.org/podc2000/, or contact the program chair, Jim Anderson, by email, firstname.lastname@example.org, or phone, 1-919-962-1757.
Workshop on Formal Methods and Computer Security, Chicago, Illinois, USA, July
Computer security protocols are notoriously difficult to get right. Surprisingly simple problems with some well known protocols have been found years after the original protocol was published and extensively analyzed. Our workshop goal is to bring together the formal methods and security communities. Security is a current hot topic in the formal methods community, and we hope that this workshop can help focus these energies. Topics of interest include descriptive techniques (specification languages, models, logics) and analysis techniques (model checking, theorem proving, and their combination), as applied to protocols for authentication, fair exchange, electronic commerce, and electronic auctions. However, this list is not exclusive. We particularly want to hear about new approaches, new problems, new security properties, and new protocol bugs. Reports on work in progress are welcome. The program of the workshop will include a keynote address by Doug Tygar, a number of technical sessions (with talks of about 15-20 minutes duration), and a panel discussion. An extended abstract (about 5-10 pages) explaining recent research results or work in progress should be mailed electronically to email@example.com, to be received by April 14, 2000. More information can be found at the conference web site at www.cs.cmu.edu/~veith/fmcs/
Third ACM International Workshop on Modeling, Analysis and Simulation of
Wireless and Mobile Systems, in conjunction with MobiCom 2000, August 6-11,
2000, Boston, MA, USA.
This workshop will focus on all aspects of wireless systems, particularly modeling analysis and simulation in wireless communication. In its third year, the 2000 International ACM Workshop on Modeling and Simulation of Wireless and Mobile Systems, will take place in Boston, MA, just after the International Conference on Mobile Computing and Networking (MobiCom 2000) to be held in Boston, August 6-11, 2000. This is an excellent opportunity to partake in two events covering a wide range of research in wireless and mobile systems. Authors are encouraged to submit both theoretical and practical results of significance. Demonstration of new tools/simulation languages are very welcome. A complete list of topics of interest, along with directions for submitting a paper are given on the workshop web page at: www.tlc.polito.it/mswim
4th International Workshop on Discrete
Algorithms and Methods for Mobile Computing & Communications, Boston,
Massachusetts, USA, August 11, 2000. In conjunction with ACM MobiCom 2000.
The introduction of mobility raises a number of new research issues. This workshop is devoted to discrete algorithms and methods in the context of mobile and wireless computing and communications. Contributions are solicited in all areas related to mobile computing and communications where discrete algorithms and methods are utilized, including, but not limited to:
* distributed algorithms frequency allocation
* scheduling location tracking
* site allocation multi-hop packet radio networks
* wireless networks synchronization
* cryptography and security error correcting codes
* handover (handoff) telecommunications
* modeling optimization
* routing satellite communication
Instructions for submitting a paper or a panel proposal are given on the conference web page at www.cis.udel.edu/~elloyd/dialm.d/home.htm. Since deadlines overlap, dual submission of papers to MobiCom and DIALM is encouraged. Any paper accepted for MobiCom will automatically be removed from consideration for DIALM.
Seventh Annual Workshop on Selected Areas in Cryptography, August 14-15, 2000,
Waterloo, Ontario, Canada.
Workshop Themes: - Design and analysis of symmetric key cryptosystems.
- Primitives for private key cryptography, including block and stream ciphers, hash functions and MACs.
- Efficient implementations of cryptographic systems in public and private key cryptography.
- Cryptographic solutions for web/internet security.
Details on submitting a paper are given on the conference web page at www.cacr.math.uwaterloo.ca/conferences/2000/SAC2000/announcement.html
9th USENIX Security Symposium, Denver, Colorado, USA, August 14-17, 2000.
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in security and applications of cryptography. Please see the conference web site at www.usenix.org/events/sec2000 for more information on the symposium, a detailed list of topics of interest, and the procedure for submitting a paper.
2000, Santa Barbara, California, USA, August 20-24, 2000.
Crypto 2000 is organized by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy, and the Computer Science Department of the University of California, Santa Barbara. For other information contact
Mathew Franklin, General Chair, Crypto 2000
3333 Coyote Hill Road
Palo Alto, CA 94304 USA
Phone: 650-812-4228 ; FAX: 650-812-4471 ;