![]() |
|
Message-ID: <572BB76C.3030905@thorsheim.net> Date: Thu, 5 May 2016 23:13:16 +0200 From: Per Thorsheim <per@...rsheim.net> To: passwords@...ts.openwall.com Subject: Re: CFP: Passwords 2016, Ruhr-University Bochum, Germany, December 5-7 HAHAHAHAHA! CFP author (Markus) and 2-3 others have read it, but didn't notice. Yes. *CONFERENCE*, not workshop. hihihi. .per Den 05.05.2016 23.09, skrev Shujun Li: > Hi Per, > > The call mentions "workshop" 3 times. > Do you mean "conference"? > > Best, > Shujun > > On 05/05/2016 21:59, Per Thorsheim wrote: >> ==================================================================== >> Call for Papers >> The 11th International Conference on Passwords >> PASSWORDS 2016 >> >> 5-7 December 2016 >> Ruhr-University Bochum, Germany >> >> https://passwords2016.rub.de/ >> ==================================================================== >> >> >> The Passwords conference was launched in 2010 as a response to >> the lack of robustness and usability of current personal >> authentication practices and solutions. Annual participation has >> doubled over the past three years. Since 2014, the conference >> accepts peer-reviewed papers. >> >> >> * IMPORTANT DATES * >> >> Research papers and short papers: >> - Title and abstract submission: 2016-07-04 (23:59 UTC-11) >> - Paper submission: 2016-07-11 (23:59 UTC-11) >> - Notification of acceptance: 2016-09-05 >> - Camera-ready from authors: 2016-09-19 >> >> Hacker Talks: >> - Talk proposal submission: 2016-09-15 (23:59 UTC-11) >> - Notification of acceptance: 2016-09-30 >> >> >> * CONFERENCE AIM * >> >> More than half a billion user passwords have been compromised >> over the last five years, including breaches at internet >> companies such as Target, Adobe, Heartland, Forbes, LinkedIn, >> Yahoo, and LivingSocial. Yet passwords, PIN codes, and similar >> remain the most prevalent method of personal >> authentication. Clearly, we have a systemic problem. >> >> This conference gathers researchers, password crackers, and >> enthusiastic experts from around the globe, aiming to better >> understand the challenges surrounding the methods personal >> authentication and passwords, and how to adequately solve these >> problems. The Passwords conference series seek to provide a >> friendly environment for participants with plenty opportunity to >> communicate with the speakers before, during, and after their >> presentations. >> >> * SCOPE * >> >> We seek original contributions that present attacks, analyses, >> designs, applications, protocols, systems, practical experiences, >> and theory. Submitted papers may include, but are not limited to, >> the following topics, all related to passwords and >> authentication: >> >> - Technical challenges and issues: >> - Cryptanalytic attacks >> - Formal attack models >> - Cryptographic protocols >> - Dictionary attacks >> - Digital forensics >> - Online attacks/Rate-limiting >> - Side-channel attacks >> - Administrative challenges: >> - Account lifecycle management >> - User identification >> - Password resets >> - Cross-domain and multi-enterprise system access >> - Hardware token administration >> - Password "replacements": >> - 2FA and multifactor authentication >> - Risk-based authentication >> - Password managers >> - Costs and economy >> - Biometrics >> - Continous authentication >> - FIDO - U2F >> - Deployed systems: >> - Best practice reports >> - Incident reports/Lessons learned >> - Human factors: >> - Usability >> - Design & UX >> - Social Engineering >> - Memorability >> - Accessibility >> - Pattern predictability >> - Gestures and graphical patterns >> - Psychology >> - Statistics (languages, age, demographics...) >> - Ethics >> >> >> * INSTRUCTIONS FOR AUTHORS * >> >> Papers must be submitted as PDF using the Springer LNCS format >> for Latex. Abstract and title must be submitted one week ahead of >> the paper deadline. >> >> We seek submissions for review in the following three categories: >> >> - Research Papers >> - Short Papers >> - "Hacker Talks" (talks without academic papers attached) >> >> RESEARCH PAPERS should describe novel, previously unpublished >> technical contributions within the scope of the call. The papers >> will be subjected to double-blind peer review by the program >> committee. Paper length is limited to 16 pages (LNCS format) >> excluding references and well-marked appendices. The paper >> submitted for review must be anonymous, hence author names, >> affiliations, acknowledgements, or obvious references must be >> temporarily edited out for the review process. The program >> committee may reject non-anonymized papers without reading >> them. The submitted paper (in PDF format) must follow the >> template described by Springer at >> http://www.springer.de/comp/lncs/authors.html. >> >> SHORT PAPERS will also be subject to peer review, where the >> emphasis will be put on work in progress, hacker achievements, >> industrial experiences, and incidents explained, aiming at >> novelty and promising directions. Short paper submissions should >> not be more than 6 pages in standard LNCS format in total. A >> short paper must be labeled by the subtitle "Short >> Paper". Accepted short paper submissions may be included in the >> conference proceedings. Short papers do not need to be >> anonymous. The program committee may accept full research papers >> as short papers. >> >> HACKER TALKS are presentations without an academic paper >> attached. They will typically explain new methods, techniques, >> tools, systems, or services within the Passwords scope. Proposals >> for Hacker Talks can be submitted by anybody ("hackers", >> academics, students, enthusiasts, etc.) in any format, but >> typically will include a brief (2-3 paragraphs) description of >> the talk's content and the person presenting. They will be >> evaluated by a separate subcommittee led by Per Thorsheim, >> according to different criteria than those used for the refereed >> papers. >> >> At least one of the authors of each accepted paper must register >> and present the paper at the workshop. Papers without a full >> registration will be withdrawn from the proceedings and from the >> workshop programme. >> >> Papers that pass the peer review process and that are presented >> at the workshop will be included in the event proceedings, >> published by Springer in the Lecture Notes in Computer >> Science (LNCS) series. >> >> Papers must be unpublished and not being considered elsewhere for >> publication. Plagiarism and self-plagiarism will be treated as a >> serious offense. Program committee members may submit papers but >> program chairs may not. The time frame for each presentation >> will be either 30 or 45 minutes, including Q&A. Publication will >> be by streaming, video and web. >> >> * ORGANIZERS * >> >> - General chair: Per Thorsheim, God Praksis AS (N) >> - Program co-chair and host: Markus Dürmuth, Ruhr-University Bochum (DE) >> - Program co-chair: Frank Stajano, University of Cambridge (UK) >> >> >> * PROGRAM COMMITTEE * >> >> (to be announced) >> >> >> * STEERING COMMITTEE * >> >> - Per Thorsheim, God Praksis AS (N) >> - Stig F. Mjolsnes, Norwegian University of Science and Technology (N) >> - Frank Stajano, University of Cambridge (UK) >> >> >> More and updated information can be found at the conference website >> https://passwords2016.rub.de/ >> > -- Best regards, Per Thorsheim CISA, CISM, CISSP, ISSAP Founder of PasswordsCon.org CEO of godpraksis.no Phone: +47 90 99 92 59 Twitter: @thorsheim
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.