Difference between revisions of "ProvSec 2019"
Jump to navigation
Jump to search
Tim Holzheim (talk | contribs) (pushed from or by wikipush) |
Tim Holzheim (talk | contribs) (edited by wikiedit) |
||
Line 3: | Line 3: | ||
|Title=13th International Conference on Provable and Practical Security | |Title=13th International Conference on Provable and Practical Security | ||
|Series=ProvSec | |Series=ProvSec | ||
− | | | + | |Event type=Conference |
|Start date=2019/10/01 | |Start date=2019/10/01 | ||
|End date=2019/10/04 | |End date=2019/10/04 |
Latest revision as of 11:16, 8 March 2021
ProvSec 2019 | |
---|---|
13th International Conference on Provable and Practical Security
| |
Event in series | ProvSec |
Dates | 2019/10/01 (iCal) - 2019/10/04 |
Homepage: | https://www.monash.edu/provsec2019 |
Location | |
Location: | Cairns, Australia |
Important dates | |
Papers: | 2019/06/24 |
Submissions: | 2019/06/24 |
Notification: | 2019/07/15 |
Registration link: | https://www.monash.edu/provsec2019 |
Accepted short papers: | 6 |
Papers: | Submitted 51 / Accepted 18 (35.3 %) |
Committees | |
General chairs: | Joseph K. Liu, Wei Xiang |
PC chairs: | Ron Steinfeld, Tsz Hon Yuen |
Keynote speaker: | Steven Galbraith, Shengli Liu |
Table of Contents | |
Topics
Areas of interest include, but are not limited to:
- Asymmetric provably secure cryptography
- Symmetric cryptographic primitives
- Lattice-based security reductions
- Leakage-resilient cryptography
- Privacy and anonymity technologies
- Secure cryptographic protocols and applications
- Security notions, approaches, and paradigms
- Steganography and steganalysis
- Blockchain and Cryptocurrency
- IoT Security
- Mobile security
- Cloud security
- Access control
- Privacy enhanced technology
- Viruses and malware
- Software security
- Database security
- Web security
- Operating system security
- Intrusion detection
- Big data security and privacy
- Biometric Security
- Network security
- Formal methods for security
- Digital forensics
- Security for critical infrastructures
- Embedded systems security
- Lightweight security
- Smart grid security
- Cyber-physical security
Important dates
Proceedings including all accepted papers will be published in LNCS and will be available at the conference.