Difference between revisions of "ProvSec 2020"
Jump to navigation
Jump to search
Tim Holzheim (talk | contribs) (pushed from or by wikipush) |
Tim Holzheim (talk | contribs) (edited by wikiedit) |
||
Line 3: | Line 3: | ||
|Title=14th International Conference on Provable and Practical Security | |Title=14th International Conference on Provable and Practical Security | ||
|Series=ProvSec | |Series=ProvSec | ||
− | | | + | |Event type=Conference |
|Start date=2020/09/22 | |Start date=2020/09/22 | ||
|End date=2020/09/25 | |End date=2020/09/25 |
Latest revision as of 11:16, 8 March 2021
ProvSec 2020 | |
---|---|
14th International Conference on Provable and Practical Security
| |
Event in series | ProvSec |
Dates | 2020/09/22 (iCal) - 2020/09/25 |
Homepage: | http://scripts.ntu.edu.sg/NewsnEvents/Pages/Events-PROVSEC2020.aspx |
Twitter account: | @NTUsg |
Location | |
Location: | Singapore, Singapore |
Important dates | |
Submissions: | 2020/06/05 |
Notification: | 2020/07/22 |
Camera ready due: | 2020/08/05 |
Committees | |
General chairs: | Kwok Yan Lam, Huaxiong Wang |
PC chairs: | Khoa Nguyen, Wenling Wu |
Table of Contents | |
Tweets by @NTUsg | |
Topics
ProvSec 2020 - the 14th International Conference on Provable and Practical Security - will take place in Singapore from 22 September to 25 September 2020. Authors are invited to submit original research papers on provable and practical security. Areas of interest include, but are not limited to:
- Provable security for asymmetric cryptography
- Provable security for symmetric cryptography
- Provable security for physical attacks
- Privacy and anonymity technologies
- Secure cryptographic protocols and applications
- Security notions, approaches, and paradigms
- Leakage-resilient cryptography
- Lattice-based cryptography and post-quantum cryptography
- Steganography and steganalysis
- Blockchain and Cryptocurrency
- IoT Security
- Cloud security
- Access control
- Privacy-enhancing technologies
- Database security
- Big data security and privacy
- Biometric Security
- Network security
- Formal methods for security
- Embedded systems security
- Lightweight security
- Cyber-physical security
Conference Proceedings
Proceedings will be published in Springer's Lecture Notes in Computer Science and will be available at the conference.