CCF推荐 | 信息安全及密码学 | 国际会议信息3条

2019 年 5 月 13 日 Call4Papers
信息安全及密码学

ASIACRYPT 2019

Annual International Conference on the Theory and Application of Cryptology and Information Security

全文截稿: 2019-05-14
开会时间: 2019-12-08
会议难度: ★★★★
CCF分类: B类
会议地点: Kobe, Japan
网址:https://asiacrypt.iacr.org/2019/
Asiacrypt 2019, the 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, will take place at Kobe Portpia Hotel in Kobe, Japan on December 8-12, 2019. The conference is organized by the International Association for Cryptologic Research (IACR).



信息安全及密码学

TCC 2019

Theory of Cryptography Conference

全文截稿: 2019-05-29
开会时间: 2019-12-01
会议难度: ★★★★
CCF分类: B类
会议地点: Nuremberg, Germany
网址:https://www.iacr.org/meetings/tcc/
The Seventeenth Theory of Cryptography Conference will be held in Nuremberg, Germany, sponsored by the the International Association for Cryptologic Research (IACR). Papers presenting original research on foundational and theoretical aspects of cryptography are sought. For more information about TCC, see the TCC manifesto.

The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them. More specifically, the scope of the conference includes, but is not limited to the:

Study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization.
Discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones.
Formulation and treatment of new cryptographic problems.
Study of notions of security and relations among them.
Modeling and analysis of cryptographic algorithms.
Study of the complexity assumptions used in cryptography.



信息安全及密码学

HotSec 2019

USENIX Workshop on Hot Topics in Security

全文截稿: 2019-06-10
开会时间: 2019-08-13
会议难度: ★★★
CCF分类: C类
会议地点: SANTA CLARA, CA, USA
网址:https://www.usenix.org/conference/hotsec19
HotSec aims to bring together researchers across computer security disciplines to discuss the state of the art, with emphasis on future directions and emerging areas.

HotSec is not your traditional security workshop! The day will consist of sessions of lightning talks on emerging work and positions in security, followed by discussion among attendees. Lightning talks are 5 MINUTES in duration—time limit strictly enforced with a gong! The format provides a way for lots of individuals to share ideas with others in a quick and more informal way, which will inspire breakout discussion for the remainder of the day.

Some of the most successful HotSec lightning talks take and defend a strong position. This instigates real discussion, and we encourage you to do so!

Need some ideas? Here are talks from last year that were successful or ideas we'd like to hear about:

Web privacy: academics love it but businesses don't.
Security: conference paper review is insecure.
Speculative execution/side channel attacks: the next wave.
Securing votes: voting machines aren't the problem, social media is.
Why social networks dropped the ball on content moderation.
Making the most out of potentially untrustworthy hardware.
Securing IoT: are our homes too smart for their own good?
Are cryptographic backdoors really that bad?
AI is a fad, not a solution in cybersecurity.
Adversarial ML: circumventing your AI protection schemes.
Native apps vs web apps: which is more secure?
Security education: too many jobs, not enough experts, and not taught early enough.
What problems does blockchain actually solve?
Are multiple codebases inherently more secure than one codebase?
Why the price of a bug bounty indicates the security of the product (or not).
Why security for binary programs matters in a web-based world.
True or false: the number of disclosed security bugs in a product indicates the security of the product
Security keys are great but no one uses them



下载Call4Papers App,获取更多详细内容!


登录查看更多
1

相关内容

ASIACRYPT:Annual International Conference on the Theory and Application of Cryptology and Information Security。 Explanation:密码学与信息安全理论与应用国际年会。 Publisher:Springer。 SIT: http://dblp.uni-trier.de/db/conf/asiacrypt/
CCF推荐 | 国际会议信息6条
Call4Papers
9+阅读 · 2019年8月13日
CCF推荐 | 国际会议信息10条
Call4Papers
8+阅读 · 2019年5月27日
计算机类 | 低难度国际会议信息6条
Call4Papers
6+阅读 · 2019年4月28日
计算机 | EMNLP 2019等国际会议信息6条
Call4Papers
18+阅读 · 2019年4月26日
人工智能 | 国际会议信息6条
Call4Papers
4+阅读 · 2019年1月4日
人工智能 | 国际会议信息10条
Call4Papers
5+阅读 · 2018年12月18日
人工智能 | COLT 2019等国际会议信息9条
Call4Papers
6+阅读 · 2018年9月21日
人工智能类 | 国际会议/SCI期刊专刊信息9条
Call4Papers
4+阅读 · 2018年7月10日
人工智能 | 国际会议截稿信息5条
Call4Papers
6+阅读 · 2017年11月22日
【今日新增】计算机领域国际会议截稿信息
Call4Papers
9+阅读 · 2017年7月21日
Arxiv
20+阅读 · 2020年6月8日
A Survey on Edge Intelligence
Arxiv
50+阅读 · 2020年3月26日
Arxiv
10+阅读 · 2019年2月19日
Arxiv
3+阅读 · 2017年12月23日
VIP会员
相关VIP内容
相关资讯
CCF推荐 | 国际会议信息6条
Call4Papers
9+阅读 · 2019年8月13日
CCF推荐 | 国际会议信息10条
Call4Papers
8+阅读 · 2019年5月27日
计算机类 | 低难度国际会议信息6条
Call4Papers
6+阅读 · 2019年4月28日
计算机 | EMNLP 2019等国际会议信息6条
Call4Papers
18+阅读 · 2019年4月26日
人工智能 | 国际会议信息6条
Call4Papers
4+阅读 · 2019年1月4日
人工智能 | 国际会议信息10条
Call4Papers
5+阅读 · 2018年12月18日
人工智能 | COLT 2019等国际会议信息9条
Call4Papers
6+阅读 · 2018年9月21日
人工智能类 | 国际会议/SCI期刊专刊信息9条
Call4Papers
4+阅读 · 2018年7月10日
人工智能 | 国际会议截稿信息5条
Call4Papers
6+阅读 · 2017年11月22日
【今日新增】计算机领域国际会议截稿信息
Call4Papers
9+阅读 · 2017年7月21日
Top
微信扫码咨询专知VIP会员