Difference between revisions of "ProvSec 2019"
Jump to navigation
Jump to search
(modified through wikirestore by orapi) |
(modified through wikirestore by orapi) |
||
Line 10: | Line 10: | ||
|Accepted short papers=6 | |Accepted short papers=6 | ||
|Acronym =ProvSec 2019 | |Acronym =ProvSec 2019 | ||
− | |End date =2019 | + | |End date =2019-10-04 |
|Series =ProvSec | |Series =ProvSec | ||
|Type =Conference | |Type =Conference | ||
Line 16: | Line 16: | ||
|State =AU/QLD | |State =AU/QLD | ||
|City =AU/QLD/Cairns | |City =AU/QLD/Cairns | ||
+ | |Year =2019 | ||
|Homepage =https://www.monash.edu/provsec2019 | |Homepage =https://www.monash.edu/provsec2019 | ||
− | |Start date =2019 | + | |Start date =2019-10-01 |
|Title =13th International Conference on Provable and Practical Security | |Title =13th International Conference on Provable and Practical Security | ||
|Accepted papers =18 | |Accepted papers =18 |
Revision as of 02:49, 19 November 2021
Event Rating
median | worst |
---|---|
![]() |
![]() |
List of all ratings can be found at ProvSec 2019/rating
ProvSec 2019 | |
---|---|
13th International Conference on Provable and Practical Security
| |
Event in series | ProvSec |
Dates | 2019-10-01 (iCal) - 2019-10-04 |
Homepage: | https://www.monash.edu/provsec2019 |
Location | |
Location: | AU/QLD/Cairns, AU/QLD, AU |
Important dates | |
Papers: | 2019/06/24 |
Submissions: | 2019/06/24 |
Notification: | 2019/07/15 |
Registration link: | https://www.monash.edu/provsec2019 |
Accepted short papers: | 6 |
Papers: | Submitted 51 / Accepted 18 (35.3 %) |
Committees | |
General chairs: | Joseph K. Liu, Wei Xiang |
PC chairs: | Ron Steinfeld, Tsz Hon Yuen |
Keynote speaker: | Steven Galbraith, Shengli Liu |
Table of Contents | |
Topics
Areas of interest include, but are not limited to:
- Asymmetric provably secure cryptography
- Symmetric cryptographic primitives
- Lattice-based security reductions
- Leakage-resilient cryptography
- Privacy and anonymity technologies
- Secure cryptographic protocols and applications
- Security notions, approaches, and paradigms
- Steganography and steganalysis
- Blockchain and Cryptocurrency
- IoT Security
- Mobile security
- Cloud security
- Access control
- Privacy enhanced technology
- Viruses and malware
- Software security
- Database security
- Web security
- Operating system security
- Intrusion detection
- Big data security and privacy
- Biometric Security
- Network security
- Formal methods for security
- Digital forensics
- Security for critical infrastructures
- Embedded systems security
- Lightweight security
- Smart grid security
- Cyber-physical security
Important dates
Proceedings including all accepted papers will be published in LNCS and will be available at the conference.