(Extracted from the Cipher Calls For Papers list)


Upcoming Call for Papers

(June 2000 - December 2000)

NGC2000  The 2nd International Workshop on Networked Group Communication, Stanford University, Palo Alto, California, USA, November 8-10, 2000.  (papers due June 5, 2000)  
The aim of the Workshop is to allow researchers and practioners to present the design and implementation techniques for networked group communication. The focus of the Workshop is strictly on multicast and networked group communication. This Workshop is the second and only international event in this area (first workshop was in Pisa, Italy, in November 1999). Authors are invited to submit papers on any issue related to networked group communication, including but not limited to:
      -  multicast congestion control
      -  multicast routing, naming, address allocation
      -  scalability in multicast services
      -  reliable and semi-reliable multicast protocols
      -  novel multicast architectures
      -  multicast security
      -  multicast deployment related issues
      -  multicast over heterogeneous media
      -  multipeer applications (distributed interactive apps, games, DIS)
      -  QoS issues with multicast
      -  Pricing and economic model for multicast traffic
      -  group management techniques
      -  network engineering for multicast services
Information on submission of papers, along with additional information on the conference can be found at the conference web site at

FSTTCS 2000  The 20th Conference on the Foundations of Software Technology and Theoretical Computer Science, New Delhi, India, December 13-15, 2000.  (paper deadline extended to June 6, 2000)  
This annual conference provides a platform for presentation of original research results in fundamental aspects of computer science. It also provides an excellent forum for meeting and exchanging ideas with people who are at the frontline of software technology and theoretical computer science. 
The Conference Proceedings will be published by Springer-Verlag in the series Lecture Notes in Computer Science (LNCS). Previous proceedings appeared as LNCS Volumes: 880, 1026, 1180, 1346, 1530, 1738.   A list of topics of interest along with detailed instructions for submitting a paper can be found at the conference web site at

PROMS2000  Protocols for Multimedia Systems,  Cracow, Poland, October 22-25, 2000.  (papers due June 26, 2000)  
The PROMS2000 conference is intended to contribute to a scientific, strategical and practical cooperation between research institutes and industrial companies in the area of distributed multimedia applications, protocols, and intelligent management tools, with emphasis on their provision over broadband networks.  An extensive list of topics of interest, along with instructions for submitting a paper, can be found on the conference web page at

NORDSEC'2000, Fifth Nordic Workshop on Secure IT Systems - Encouraging Co-operation, Reykjavik, Iceland, October 12-13, 2000. (Submissions due: August 1, 2000) 
The NORDSEC workshops were started in 1996 with the aim to bring together researchers and practitioners within IT security in the Nordic countries. These workshops have remained a forum for co-operation between the Nordic research organizations, industry and the computer societies. The emphasis of the workshop is to encourage interchange and cooperation between the research community and the industrial and software development community. The theme of the workshop is applied security, i.e., all kinds of security issues for all kinds of information technology systems. We are in particular looking for contributions that deal with technology transfer and application of research in development. Furthermore, this year's NORDSEC will look more specifically at several Special Topics that are closely related to Computer Security, but are not often discussed in the same forum: Software Engineering, Virus Protection, and Privacy Protection. Details are to be found on the conference website at

NDSS'01, The Internet Society 2001 Network and Distributed System Security Symposium, Catamaran Resort, San Diego, California, February 7-9, 2001. (Papers due: August 2, 2000) 
This symposium will foster information exchange among researchers and practioners of network and distributed system security services. The intended audience includes those who are interested in the practical aspects of network and distributed system security, focusing on actual system design and implementation, rather than theory. A major goal of the symposium is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technology. The proceedings of the symposium will be published by the Internet Society. The Program Committee invites both technical papers and panel proposals. Submissions are solicited for, but are not limited to, the following topics:
    * Secure Electronic Commerce.
    * Intellectual Property Protection.
    * Network security policies.
    * Integrating Security in Internet protocols.
    * Attack-resistant protocols and services.
    * Special problems and case studies.
    * Security for collaborative applications and services.
    * Fundamental security services.
    * Supporting mechanisms and APIs.
    * Integrating security services with system and application security facilities and protocols.
    * Security for emerging technologies.
    * Intrusion Avoidance, Detection, and Response.
    * Network Perimeter Controls.
    * Virtual Private Networks.
Submissions must be received by August 2, 2000. Complete submission information can be found at Dates, final call for papers, advance program, and registration information are available at

INDOCRYPT'2000, First International Conference on Cryptology in India, Indian Statistical Institute, Calcutta, India, December 10-13, 2000. (Submissions due: August 10, 2000) 
Original papers on all technical aspects of cryptology are solicited.  Please see the conference web page at for paper submission details.

ISADS 2001, The Fifth International Symposium on Autonomous Decentralized Systems, Dallas, Texas, USA, March 26-28, 2001.  (Papers and panel proposals due August 15, 2000) 
Driven by the continuous growth in the power, intelligence and openness of computer, communication and control technologies, possibilities and opportunities for realizing highly efficient and dependable business and control systems have been steadily increasing. Dynamically changing social and economic situations demand next-generation systems based on emerging technologies and applications. Such systems are expected to have the characteristics of living systems composed of largely autonomous and decentralized components. Such systems are called Autonomous Decentralized Systems (ADS). While ISADS 2001 will primarily focus on advancements and innovation in ADS concept, technologies, and applications related to the increasingly important topic of Electronic Commerce, other themes such as telecommunications and heterogeneous system and application integration will also be included. The scope of discussions on ADS shall include, but not be limited to: 
      * Computer and communication architectures / intelligent network /Internet; 
      * Heterogeneous distributed information / control systems; 
      * Mobile agent /computer-supported cooperative works;
      * Distributed software development and maintenance;
      * Assurance, fault tolerance and on-line expansion; 
      * Object management architecture /design pattern / application frameworks; 
      * Emergent control and robotic systems; 
      * Novel applications: electronic commerce, telecommunications,  information service systems, manufacturing systems,  real-time event management, office automation, traffic and 
transportation control, logistics systems. See the conference web site at for complete instructions on submitting a paper or a proposal for a panel session.

FME2001  FORMAL METHODS EUROPE Formal Methods for Increasing Software Productivity, Humboldt-Universitaet zu Berlin, Germany, March 12-16, 2001.  (Papers, tutorial and workshop proposals due: August 25, 2000)  
FME 2001 is the tenth in a series of symposia organised by Formal Methods Europe, an independent association whose aim is to stimulate the use of, and research on, formal methods for software development. The theme of FME 2001 is Formal Methods for Increasing Software Productivity. This theme recognizes that formal methods have the potential to do more for industrial software development than enhance software quality--they can also increase productivity at many different points in the software life-cycle. The symposium committee is particularly interested in papers on the use of formal methods to
increase productivity, for example on:
      * Codifying domain knowledge
      * Re-using components
      * Automatically generating code and/or documentation
      * Improving the efficiency of software testing
      * Enhancing analysis techniques for validation and verification
      * Exploiting commonalities within product families
      * Improving the maintainability and modifiability of software
      * Empirical studies of effects on productivity

The symposium committee solicits full-length papers in two broad categories:
1. Use of formal methods, including reports on industrial use, substantial case studies, comparisons among methods, education, and technology transfer.
2. Development of formal methods, including motivating factors, theoretical foundations, extensions, manual procedures, and tool support.
More information about the submission of papers, tutorial and workshop proposals, can be found on the conference web site at

OPENARCH'01  The Fourth IEEE Conference on Open Architectures and Network Programming, Hilton Anchorage Hotel, Anchorage, Alaska, April 22-23, 2001.  (Papers, tutorial and workshop proposals due: October 1, 2000)  
The Fourth IEEE Conference on Open Architectures and Network Programming invites participation in this international forum on active, and programmable networks. Advances in open signaling and control, active networks, mobility management, transportable software, web-based services access, and distributed systems technologies are driving a reexamination of existing network software architectures and the evolution of control and management systems away from traditional constrained solutions. OPENARCH 2001 will foster a better understanding of these new network software architectures and techniques that are making the network interface more flexible and robust. Authors are invited to submit both full and short papers for consideration. Suggested topics include:
     - Advances in active networks
     - Open and innovative signaling systems 
     - Programming abstractions and interfaces for networks
     - Service creation platforms 
     - Programming for mobility 
     - Programming for Quality of Service 
     - Intelligent agents and trading 
     - Distributed computing models and algorithms 
     - Security in an open object world 
     - Support for multiple control planes 
     - Control and resource APIs and object representations 
     - Performance of control architectures 
     - Experimental architectures and implementation techniques 
     - Enabling technologies, platforms and languages (CORBA, WWW, Java, ...) 
     - Reliability of programmable networking technologies 
     - Modeling of network services 
     - Programmability support for virtual networks 
     - Interactive multimedia, multi-party cooperation and groupware 
     - Pricing and real-time billing 
     - Secure transactions processing and electronic commerce
     - Active networks in telephony 
OPENARCH is sponsored by the IEEE Communications Society and will be
co-located and organized in conjunction with INFOCOM 2001. Complete instructions for submissions can be found on the conference web site at

IHW'2001 4th International Information Hiding Workshop, Holiday Inn University Center, Pittsburgh, PA, USA, April 25-27, 2001 (submissions due December 7, 2000)  [posted here 2/26/00]
Many researchers are interested in hiding information or, conversely, in preventing others from doing so. As the need to protect digital intellectual property grows ever more urgent, this research is of increasing interest to both the academic and business communities. Current research themes include: copyright marking of digital objects, covert channels in computer systems, detection of hidden information, subliminal channels in cryptographic protocols, low-probability-of-intercept communications, and various kinds of anonymity services ranging from steganography through location security to digital elections. Interested parties are invited to submit papers on  research and practice which are related to these areas of interest. Further information  can be obtained at or by contacting the program chair at


Upcoming Conferences and Workshops
(June 2000 - August 2000)

CITSS12  Canadian Information Technology Security Symposium, Ottawa, Canada, June 19-23, 2000.  
We invite you to attend Building Trust for a Secure Global Economy, the 12th Annual Information Technology Security Symposium. This annual event is sponsored by the Communications Security Establishment (CSE), a Canadian Federal Government lead agency responsible for information technology security. This year's symposium takes you inside some of the most important security issues facing businesses and governments today. CSE's weeklong symposium features one and a half days of tutorials, a one-day plenary session and more than 36 in depth presentations
by Canadian and international experts in their fields. An industry leading vendor trade show with more than 40 booths completes the program. Presentations will focus on:
     - PKI issues and solutions 
     - e-commerce/e-business
     - Critical Information Infrastructure Protection 
     - Intrusion detection
     - Security in open source software
More info on the symposium web page at

FIRST'2000, The 12th Annual FIRST Conference on Computer Security and Incident Handling, Chicago, Illinois, USA, June 25-30, 2000.  
The Forum of Incident Response and Security Teams (FIRST, ) brings security incident response teams together including government, commercial, and academic organizations. The conference is a five day event, two days of tutorials and three days of technical sessions including refereed paper presentations, invited talks, and panel discussions. The focus of the FIRST'2000 conference is on the most recent practical advances in computer security in all its aspects. The Program Committee is soliciting original papers analyzing, among other topics, methodologies for drafting security policies, recent intrusion techniques, describing experiences in building incident response capabilities, working security architectures, pros and cons of both commercial and experimental pro-active security tools. The deadline for submissions is NOVEMBER 15, 1999. The full call for papers is at

IC'2000, Special session at IC'2000, the First International Conference on Internet Computing, Monte Carlo Resort, Las Vegas, Nevada, USA, June 26-29, 2000. 
This special session, New Paradigms in Computer Security, at IC'2000 is to present recent advances in computer system security. The main focus will be on new approaches for less vulnerable program generation and intrusion detection.  Papers are solicited on the topic areas include, but are not limited to:

* Analysis tools

* Cases in Practice

* Course or Lab development

* Distributed System Architecture

* Emerging Curricula

* Intrusion Detection System  Integration

* IDS in distributed client-server computing

* Processor and Software Architecture

 * Standards

Submit extended abstracts in PDF or postscript format, limited to 1200 words in length, to The due date for the extended abstract is March 17, 2000.  For more information on IC'2000, visit the conference web site at


CSFW-13, 13th IEEE Computer Security Foundations Workshop, Cambridge, England, July 3-5, 2000.  
This workshop series brings together researchers in computer science to examine foundational issues in computer security. We are interested both in new results in theories of computer security and also in more exploratory presentations that examine open questions and raise fundamental concerns about existing theories. Both papers and panel proposals are welcome. Possible topics include, but are not limited to:

*Access Control *Authentication *Data and System Integrity
*Database Security *Network Security *Distributed Systems Security
*Anonymity *Privacy *Security for Mobile Computing
*Security Protocols *Security Models *Formal Methods for Security
*Information Flow *Executable Content
Workshop attendance is limited to about 40 participants. Complete instructions for submitting a paper or panel proposal are provided on the workshop web page at 


IRISH2000 4th Irish Workshop on Formal Methods National University of Ireland, Maynooth, July 5-6, 2000. 
The fourth in a series of annual Irish Workshops on Formal Methods will be held in the National University of Ireland, Maynooth.  We are now seeking submissions of work in progress papers in the area of formal methods, theoretical computer science, and mathematics covering the topics listed above. There will be opportunity for these papers to be submitted and reviewed as full papers, after the workshop has completed. For the theoretical day the Programme Committee seeks submissions of papers in the general area of formal methods, theoretical computer science, and mathematics, covering, but not restricted to, the following topics: formal systems, proof systems, mathematical models of computing, semantics, tools, industrial and teaching experiences.  For the industrial day it is planned to offer industry-oriented tutorials. The idea is that these will provide an introduction to formal methods, and be tailored to meet specific needs.  The conference web site is at

WITS'2000, Workshop on Issues in the Theory of Security, Geneva, Switzerland, July 7-8, 2000 
The members of The IFIP WG 1.7 on "Theoretical Foundations of Security Analysis and Design" will hold their annual workshop as an open event to which all researchers working on the theory of computer security are invited. The W/S will be co-located with ICALP '00 ( Its program will encourage discussions by all attendees, both during and after scheduled presentations on participants' ongoing work.  Topics of interest include:
* formal definition and verification of the various aspects of security:  confidentiality,   integrity, authentication and availability;

new theoretically-based techniques for the formal analysis and design of cryptographic protocols and their manifold applications (e.g., electronic commerce);

* information flow modeling and its application to the theory of confidentiality policies,
* composition of systems, and covert channel analysis;
* formal techniques for the analysis and verification of mobile code;
* formal analysis and design for prevention of denial of service.

Details on the conference and submission procedure can be found on the conference web site at, or contact the program chair, Pierpaolo Degano, by email,, or phone, +39 050 887257, or fax, +39 050 887226.


ACISP'2000, Fifth Australasian Conference on Information Security and Privacy, Brisbane, Australia, July 10-12, 2000. 
Papers pertaining to all aspects of information security and privacy are solicited. Papers may present theory, techniques, applications and practical experiences on any relevant topic including: authentication and identification, database security, mobile communications security, secure operating systems, security and cryptography policy, security management, commercial applications, key management and auditing, secure electronic commerce, security architectures and models, distributed system security, evaluation and certification, cryptology, access control, network security, smart cards, risk assessment and copyright protection. Please see the conference web page at for details.

PODC'2000, Nineteenth Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, Portland, Oregon, USA, July 16-19, 2000. 
Research contributions on the theory, design, specification, implementation or application of distributed systems are solicited. This year PODC will be held in conjunction with a workshop on middleware (information concerning the workshop will be posted on the PODC web site once it is available). In light of this, PODC especially encourages papers addressing distributed computing issues in building and using middleware. Topics of interest include, but are not limited to:

       * distributed algorithms and their complexity,
      * specification, semantics and verification of distributed systems,
      * issues relating to the design and use of middleware platforms,
      * fault tolerance of distributed systems,
      * cryptographic and security protocols for distributed systems,
      * mobile computing,
      * distributed computing issues in the Internet, including the Web,
      * communication network protocols and architectures,
      * multiprocessor/cluster architectures and algorithms,
      * distributed operating systems and databases,
      * consistency conditions, concurrency control and synchronization,
      * distributed object-oriented computing.
Conference presentations will have two formats: "Regular presentations" of approximately 25 minutes accompanied by papers of up to 10 pages in the proceedings, and "Brief announcements" of approximately 10 minutes accompanied by one page abstracts in the proceedings. Details on the conference and submission procedure can be found on the conference web site at, or contact the program chair, Jim Anderson, by email,, or phone, 1-919-962-1757.


FMCS'2000  Workshop on Formal Methods and Computer Security, Chicago, Illinois, USA, July 20, 2000.  
Computer security protocols are notoriously difficult to get right.  Surprisingly simple problems with some well known protocols have been found years after the original protocol was published and extensively analyzed. Our workshop goal is to bring together the formal methods and security communities.  Security is a current hot topic in the formal methods community, and we hope that this workshop can help focus these energies. Topics of interest include descriptive techniques (specification languages, models, logics) and analysis techniques (model checking, theorem proving, and their combination), as applied to protocols for authentication, fair exchange, electronic commerce, and electronic auctions. However, this list is not exclusive. We particularly want to hear about new approaches, new problems, new security properties, and new protocol bugs. Reports on work in progress are welcome. The program of the workshop will include a keynote address by Doug Tygar, a number of technical sessions (with talks of about 15-20 minutes duration), and a panel discussion.  An extended abstract (about 5-10 pages) explaining recent research results or work in progress should be mailed electronically to, to be received by April 14, 2000. More information can be found at the conference web site at 

RBAC'2000  Fifth ACM Workshop on Role-Based Access Control, Technical University of Berlin, Berlin, Germany, July 26-28, 2000.  
The ACM workshops on RBAC bring together researchers, developers, and practitioners to discuss the application of RBAC to both traditional and emerging systems and the development of new modeling paradigms for future applications. The workshop invites participation from the database, network, distributed systems, operating systems, security and application communities.  See the workshop web page at for information on submitting a paper or panel proposal.

MSWiM'2000, Third ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems, in conjunction with MobiCom 2000, August 6-11, 2000, Boston, MA, USA.  
This workshop will focus on all aspects of wireless systems, particularly modeling analysis and simulation in wireless communication. In its third year, the 2000 International ACM Workshop on Modeling and Simulation of Wireless and Mobile Systems, will take place in Boston, MA, just after the International Conference on Mobile Computing and Networking (MobiCom 2000) to be held in Boston, August 6-11, 2000. This is an excellent opportunity to partake in two events covering a wide range of research in wireless and mobile systems. Authors are encouraged to submit both theoretical and practical results of significance. Demonstration of new tools/simulation languages are very welcome.  A complete list of topics of interest, along with directions for submitting a paper are given on the workshop web page at:

4th International Workshop on Discrete Algorithms and Methods for Mobile Computing & Communications,  Boston, Massachusetts, USA, August 11, 2000. In conjunction with ACM MobiCom 2000.   
The introduction of mobility raises a number of new research issues. This workshop is devoted to discrete algorithms and methods in the context of mobile and wireless computing and communications. Contributions are solicited in all areas related to mobile computing and communications where discrete algorithms and methods are utilized, including, but not limited to: 
             * distributed algorithms frequency allocation 
             * scheduling location tracking 
             * site allocation multi-hop packet radio networks 
             * wireless networks synchronization 
             * cryptography and security error correcting codes 
             * handover (handoff) telecommunications 
             * modeling optimization 
             * routing satellite communication 
Instructions for submitting a paper or a panel proposal are given on the conference web page at  Since deadlines overlap, dual submission of papers to MobiCom and DIALM is encouraged. Any paper accepted for MobiCom will automatically be removed from consideration for DIALM.

SAC'2000, Seventh Annual Workshop on Selected Areas in Cryptography, August 14-15, 2000, Waterloo, Ontario, Canada.  
Workshop Themes:    -  Design and analysis of symmetric key cryptosystems.
   -  Primitives for private key cryptography, including block and stream ciphers, hash functions and MACs.
   -  Efficient implementations of cryptographic systems in public and private key cryptography.
   -  Cryptographic solutions for web/internet security.

Details on submitting a paper are given on the conference web page at

USENIX, 9th USENIX Security Symposium, Denver, Colorado, USA, August 14-17, 2000.
The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in security and applications of cryptography. Please see the conference web site at for more information on the symposium, a detailed list of topics of interest, and the procedure for submitting a paper. 

CHES'2000, Workshop on Cryptographic Hardware and Embedded Systems, Worcester Polytechnic Institute, Worcester, Massachusetts, USA., August 17-18, 2000.  
The focus of this workshop is on all aspects of cryptographic hardware and embedded system design.  Of special interest are contributions that describe new methods for efficient hardware implementations and high-speed software for embedded systems. The topics of interest include but are not limited to:
          * Computer architectures for public-key cryptosystems
          * Computer architectures for secret-key cryptosystems
          * Reconfigurable computing and applications in cryptography
          * Cryptographic processors and co-processors
          * Modular and Galois field arithmetic architectures
          * Tamper resistance on the chip and board level
          * Architectures for smart cards
          * Tamper resistance for smart cards
          * Efficient algorithms for embedded processors
          * Special-purpose hardware for cryptanalysis
          * Fast network encryption
          * True and pseudo random number generators
If you want to receive emails with subsequent Call for Papers and registration information, please send a brief mail to  Complete instructions for authors can be found on the workshop web page at www.ece.WPI.EDU/Research/crypt/ches.  You may also contact the Program Chairs Cetin Kaya Koc (Koc@ece.orst,  +1 541 737 4853) or  Christof Paar (, +1 508 831 5061).

CRYPTO 2000, Santa Barbara, California, USA, August 20-24, 2000.  
Crypto 2000 is organized by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy, and the Computer Science Department of the University of California, Santa Barbara. For other information contact
          Mathew Franklin, General Chair, Crypto 2000 
          Xerox Parc 
          3333 Coyote Hill Road
          Palo Alto, CA 94304 USA 
          Phone: 650-812-4228 ; FAX: 650-812-4471 ;

Please see the Cipher calls-for-papers list and the Cipher calendar for complete listings.