CHI-ANNOUNCEMENTS Archives

ACM SIGCHI General Interest Announcements (Mailing List)

CHI-ANNOUNCEMENTS@LISTSERV.ACM.ORG

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Content-Type:
text/plain; charset="UTF-8"
Date:
Wed, 26 Jun 2019 10:01:48 +0200
Reply-To:
Publicity Chair ESORICS 2019 <[log in to unmask]>
Subject:
MIME-Version:
1.0
Message-ID:
Content-Transfer-Encoding:
quoted-printable
Sender:
"ACM SIGCHI General Interest Announcements (Mailing List)" <[log in to unmask]>
From:
Publicity Chair ESORICS 2019 <[log in to unmask]>
Parts/Attachments:
text/plain (127 lines)
--------------------------------------------------------------------------------
ESORICS 2019 - CALL FOR POSTERS
--------------------------------------------------------------------------------
The European Symposium on Research in Computer Security - Poster Session
https://esorics2019.uni.lu/posters/
23 September 2019
Luxembourg
--------------------------------------------------------------------------------
The European Symposium on Research in Computer Security (ESORICS) 2019 will
be held in Luxembourg from 23 to 25 September. For the first time, this
year ESORICS will include a poster session on the evening of September 23.
The poster session is ideal to share preliminary or established research
and to spark discussion. Poster presenters will enjoy a multi-hour session
to describe their work and get feedback from attendees.
--------------------------------------------------------------------------------
IMPORTANT DATES:

Submission deadline: August 1
Author notification: August 15
--------------------------------------------------------------------------------
SUBMISSION:

Authors are asked to submit a 2-page abstract in LNCS format that describes
the main contributions of the poster. Proposals should emphasize the
motivation for the work and summarize the results being presented.

The abstracts must not be anonymous, and must contain the authors' names,
affiliations, and contact information. The title must begin with the
keyword “POSTER:”. Submissions that are not formatted as described above
risk rejection without review. At least one presenter per accepted poster
must attend the conference. The poster should be submitted by email to
posters-esorics2019 [at] uni [dot] lu

The participants will have to print and bring the posters themselves and
these will not appear in the proceedings.
--------------------------------------------------------------------------------
PROGRAM COMMITTEE

Gunes Acar, Princeton University
Josep Balasch, KU Leuven
Kovila Coopamootoo, Newcastle University
Constantin Catalin Dragan, University of Surrey
Chloe R. Martindale, Eindhoven University of Technology
Mustafa A. Mustafa, University of Manchester
Alfredo Rial, University of Luxembourg
Daniele Sgandurra, Royal Holloway - University of London
--------------------------------------------------------------------------------
PROGRAM CHAIR

Alfredo Rial, University of Luxembourg
--------------------------------------------------------------------------------
CONTACT

posters-esorics2019 [at] uni [dot] lu
--------------------------------------------------------------------------------
TOPICS

Topics of interest include, but are not limited to

Access control
Accountability
Ad hoc networks
Anonymity
Applied cryptography
Authentication
Biometrics
Blockchain and finance security
Data and computation integrity
Database security
Data protection
Deep learning for attack and defense
Digital content protection
Digital forensics
Distributed systems security
Embedded systems security
Inference control
Information hiding
Identity management
Information flow control
Information security governance and management
Intrusion detection
Formal security methods
Language-based security
Network security
Phishing and spam prevention
Privacy
Privacy preserving data mining
Risk analysis and management
Secure electronic voting
Security architectures
Security economics
Security metrics
Security models
Security and privacy for big data
Security and privacy in cloud scenarios
Security and privacy in complex systems
Security and privacy in content centric networking
Security and privacy in crowdsourcing
Security and privacy in the IoT
Security and privacy in location services
Security and privacy for mobile code
Security and privacy in pervasive / ubiquitous computing
Security and privacy policies
Security and privacy in social networks
Security and privacy in web services
Security and privacy in cyber-physical systems
Security, privacy and resilience in critical infrastructures
Security verification
Software security
Systems security
Trust models and management
Trustworthy user devices
Usable security and privacy
Web security
Wireless security
--------------------------------------------------------------------------------

    ---------------------------------------------------------------
    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see http://listserv.acm.org
    ---------------------------------------------------------------

ATOM RSS1 RSS2