Difference between revisions of "ProvSec 2019"
Jump to navigation
Jump to search
(modified through wikirestore by orapi) |
(modified through wikirestore by orapi) |
||
| Line 10: | Line 10: | ||
|Accepted short papers=6 | |Accepted short papers=6 | ||
|Acronym =ProvSec 2019 | |Acronym =ProvSec 2019 | ||
| − | |End date =2019 | + | |End date =2019-10-04 |
|Series =ProvSec | |Series =ProvSec | ||
|Type =Conference | |Type =Conference | ||
| Line 16: | Line 16: | ||
|State =AU/QLD | |State =AU/QLD | ||
|City =AU/QLD/Cairns | |City =AU/QLD/Cairns | ||
| + | |Year =2019 | ||
|Homepage =https://www.monash.edu/provsec2019 | |Homepage =https://www.monash.edu/provsec2019 | ||
| − | |Start date =2019 | + | |Start date =2019-10-01 |
|Title =13th International Conference on Provable and Practical Security | |Title =13th International Conference on Provable and Practical Security | ||
|Accepted papers =18 | |Accepted papers =18 | ||
Revision as of 01:49, 19 November 2021
Event Rating
| median | worst |
|---|---|
List of all ratings can be found at ProvSec 2019/rating
| ProvSec 2019 | |
|---|---|
13th International Conference on Provable and Practical Security
| |
| Event in series | ProvSec |
| Dates | 2019-10-01 (iCal) - 2019-10-04 |
| Homepage: | https://www.monash.edu/provsec2019 |
| Location | |
| Location: | AU/QLD/Cairns, AU/QLD, AU |
| Important dates | |
| Papers: | 2019/06/24 |
| Submissions: | 2019/06/24 |
| Notification: | 2019/07/15 |
| Registration link: | https://www.monash.edu/provsec2019 |
| Accepted short papers: | 6 |
| Papers: | Submitted 51 / Accepted 18 (35.3 %) |
| Committees | |
| General chairs: | Joseph K. Liu, Wei Xiang |
| PC chairs: | Ron Steinfeld, Tsz Hon Yuen |
| Keynote speaker: | Steven Galbraith, Shengli Liu |
| Table of Contents | |
Topics
Areas of interest include, but are not limited to:
- Asymmetric provably secure cryptography
- Symmetric cryptographic primitives
- Lattice-based security reductions
- Leakage-resilient cryptography
- Privacy and anonymity technologies
- Secure cryptographic protocols and applications
- Security notions, approaches, and paradigms
- Steganography and steganalysis
- Blockchain and Cryptocurrency
- IoT Security
- Mobile security
- Cloud security
- Access control
- Privacy enhanced technology
- Viruses and malware
- Software security
- Database security
- Web security
- Operating system security
- Intrusion detection
- Big data security and privacy
- Biometric Security
- Network security
- Formal methods for security
- Digital forensics
- Security for critical infrastructures
- Embedded systems security
- Lightweight security
- Smart grid security
- Cyber-physical security
Important dates
Proceedings including all accepted papers will be published in LNCS and will be available at the conference.