[p2p-hackers] CFP: 8th European Symposium on Research in Computer Security

Sabrina De Capitani di Vimercati decapita at ing.unibs.it
Sun Feb 16 07:18:02 UTC 2003

      [Apologies if you receive multiple copies of this message]

                           CALL FOR PAPERS

               Gjøvik, Norway - October 13-15, 2003
              Organized by Gjøvik University College 
              Held in conjunction with  Nordsec 2003



Papers offering novel research contributions in any aspect of computer
security are solicited for submission to the Eighth European Symposium
on Research in Computer Security (ESORICS 2003).  Organized in a
series of European countries, ESORICS is confirmed as the European
research event in computer security. The symposium started in 1990 and
has been held on alternate years in different European countries and
attracts an international audience from both the academic and
industrial communities. From 2002 it will be held yearly.  The
Symposium has established itself as one of the premiere, international
gatherings on Information Assurance. Papers may present theory,
technique, applications, or practical experience on topics including:

- access control                    - network security 
- accountability                    - non-interference 
- anonymity                         - privacy-enhancing technology
- applied cryptography              - pseudonymity 
- authentication                    - security as quality of service 
- covert channels                   - secure electronic commerce 
- cryptographic protocols           - security administration 
- cybercrime                        - security evaluation 
- data integrity                    - security management 
- denial of service attacks         - security models 
- dependability                     - security metrics
- firewalls                         - security requirements engineering 
- formal methods in security        - security verification 
- inference control                 - smartcards
- information flow control          - steganography
- information warfare               - subliminal channels 
- intellectual property protection  - survivability
- intrusion detection               - system security
- intrusion tolerance               - transaction management
- language-based security           - trustworthy user devices 

The primary focus is on high-quality original unpublished research,
case studies and implementation experiences. We encourage submissions
of papers discussing industrial research and development.  Proceedings
will be published by Springer-Verlag in the Lecture Notes in Computer
Science series.

Submissions must not substantially duplicate work that any of the
authors has published elsewhere or has submitted in parallel to any
other conference or workshop with proceedings. The paper must list all
authors and their affiliates; in case of multiple authors, the contact
author must be indicated (note that ESORICS does not require
anonymized submissions). It should begin with a title, a short
abstract, and a list of key words, and its introduction should
summarize the contributions of the paper at a level appropriate for a
non-specialist reader. The paper should be at most 15 pages excluding
the bibliography and clearly marked appendices, and at most 24 pages
in total, using at least 11-point font, reasonable margins, and page
numbers on each page. Committee members are not required to read
appendices; the paper should be intelligible without them. The
document must be in either PostScript or Acrobat PDF format, and must
be legible after printing on standard gray-scale printers, both those
that use A4 and those that use 8-1/2x11" paper. Submissions not
meeting these guidelines risk rejection without consideration of their

Authors are invited to submit their papers electronically. A detailed
description of the electronic submission procedure will appear in
FEBRUARY 2003 on the ESORICS 2003 submission page
(http://www.hig.no/esorics2003/submit.html). Submissions must conform
to this procedure and be received by APRIL 11, 2003 in order to be
considered.  Notification of acceptance or rejection will be sent to
authors by JUNE 27, 2003. Authors of accepted papers must be prepared
to sign a copyright statement and must guarantee that their paper will
be presented at the conference. Authors of accepted papers must follow
the Springer Information for Authors' guidelines for the preparation
of the manuscript and use the templates provided there. The final copy
of the paper may be no longer than sixteen (16) pages (which
corresponds to approx. 8000 words in Springer LNCS style), unless
otherwise arranged with the Program Chair. Last day for receipt of
camera-ready copy for the proceedings is JULY 27, 2003.

Jørn Wroldsen 
(Gjøvik University College, N)

Einar Snekkenes 
(Gjøvik University College, N)

Pierangela Samarati 
(University of Milan, I)

Dieter Gollmann 
(Microsoft Research, UK)


Tuomas Aura, Microsoft Research, UK
Joachim Biskup, University of Dortmund, D
Tønnes Brekne, Telenor, N
Frédéric Cuppens,IRIT, F
Marc Dacier,EURECOM, F
Herve Debar, France Telecom R&D, F
Sabrina De Capitani di Vimercati, University of Milan, I
Yves Deswarte,LAAS-CNRS, F
Simon Foley, University College Cork, IE
Dieter Gollmann, Microsoft Research, UK
Trent Jaeger, IBM Research, USA
Kaoru Kurosawa, Ibaraki University, J
Heiko Mantel, DFKI, D
John McHugh, CERT, USA
Ken Moody, University of Cambridge, UK
Stefano Paraboschi, University of Bergamo, I
Birgit Pfitzmann, IBM Research, CH
Avi Rubin, Johns Hopkins University, USA
Peter Ryan, University of Newcastle upon Tyne, UK
Pierangela Samarati, University of Milan, I
Tomas Sander, HP, USA
Einar Snekkenes, Gjøvik University College, N
Michael Steiner, IBM Research, USA
Paul Syverson, NRL, USA
Michael Waidner, IBM Research, CH

For details: http://www.hig.no/esorics2003
On-site arrangements: esorics2003info at hig.no
General program information: esorics2003prog at hig.no

More information about the P2p-hackers mailing list