Print

Print


--------------------------------------------------------------------------------
ESORICS 2019 - CALL FOR POSTERS
--------------------------------------------------------------------------------
The European Symposium on Research in Computer Security - Poster Session
https://esorics2019.uni.lu/posters/
23 September 2019
Luxembourg
--------------------------------------------------------------------------------
The European Symposium on Research in Computer Security (ESORICS) 2019 will be held in Luxembourg from 23 to 25 September. For the first time, this year ESORICS will include a poster session on the evening of September 23. The poster session is ideal to share preliminary or established research and to spark discussion. Poster presenters will enjoy a multi-hour session to describe their work and get feedback from attendees.
--------------------------------------------------------------------------------
IMPORTANT DATES:
 
Submission deadline: August 1
Author notification: August 15
--------------------------------------------------------------------------------
SUBMISSION:
 
Authors are asked to submit a 2-page abstract in LNCS format that describes the main contributions of the poster. Proposals should emphasize the motivation for the work and summarize the results being presented.
 
The abstracts must not be anonymous, and must contain the authors' names, affiliations, and contact information. The title must begin with the keyword “POSTER:”. Submissions that are not formatted as described above risk rejection without review. At least one presenter per accepted poster must attend the conference. The poster should be submitted by email to posters-esorics2019 [at] uni [dot] lu
 
The participants will have to print and bring the posters themselves and these will not appear in the proceedings.
--------------------------------------------------------------------------------
PROGRAM COMMITTEE
 
Gunes Acar, Princeton University
Josep Balasch, KU Leuven
Kovila Coopamootoo, Newcastle University
Constantin Catalin Dragan, University of Surrey
Chloe R. Martindale, Eindhoven University of Technology
Mustafa A. Mustafa, University of Manchester
Alfredo Rial, University of Luxembourg
Daniele Sgandurra, Royal Holloway - University of London
--------------------------------------------------------------------------------
PROGRAM CHAIR
 
Alfredo Rial, University of Luxembourg
--------------------------------------------------------------------------------
CONTACT
 
posters-esorics2019 [at] uni [dot] lu
--------------------------------------------------------------------------------
TOPICS
 
Topics of interest include, but are not limited to
 
Access control
Accountability
Ad hoc networks
Anonymity
Applied cryptography
Authentication
Biometrics
Blockchain and finance security
Data and computation integrity
Database security
Data protection
Deep learning for attack and defense
Digital content protection
Digital forensics
Distributed systems security
Embedded systems security
Inference control
Information hiding
Identity management
Information flow control
Information security governance and management
Intrusion detection
Formal security methods
Language-based security
Network security
Phishing and spam prevention
Privacy
Privacy preserving data mining
Risk analysis and management
Secure electronic voting
Security architectures
Security economics
Security metrics
Security models
Security and privacy for big data
Security and privacy in cloud scenarios
Security and privacy in complex systems
Security and privacy in content centric networking
Security and privacy in crowdsourcing
Security and privacy in the IoT
Security and privacy in location services
Security and privacy for mobile code
Security and privacy in pervasive / ubiquitous computing
Security and privacy policies
Security and privacy in social networks
Security and privacy in web services
Security and privacy in cyber-physical systems
Security, privacy and resilience in critical infrastructures
Security verification
Software security
Systems security
Trust models and management
Trustworthy user devices
Usable security and privacy
Web security
Wireless security
--------------------------------------------------------------------------------