Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <572BBB74.9090609@gmail.com>
Date: Thu, 5 May 2016 22:30:28 +0100
From: Shujun Li <hooklee@...il.com>
To: passwords@...ts.openwall.com
Subject: Re: CFP: Passwords 2016, Ruhr-University Bochum, Germany,
 December 5-7


So it may have been based on a workshop c4p template :-)

Shujun

On 05/05/2016 22:13, Per Thorsheim wrote:
> HAHAHAHAHA!
>
> CFP author (Markus) and 2-3 others have read it, but didn't notice. Yes.
> *CONFERENCE*, not workshop.
>
> hihihi.
>
> .per
>
>
>
> Den 05.05.2016 23.09, skrev Shujun Li:
>> Hi Per,
>>
>> The call mentions "workshop" 3 times.
>> Do you mean "conference"?
>>
>> Best,
>> Shujun
>>
>> On 05/05/2016 21:59, Per Thorsheim wrote:
>>> ====================================================================
>>> Call for Papers
>>> The 11th International Conference on Passwords
>>> PASSWORDS 2016
>>>
>>> 5-7 December 2016
>>> Ruhr-University Bochum, Germany
>>>
>>> https://passwords2016.rub.de/
>>> ====================================================================
>>>
>>>
>>> The Passwords conference was launched in 2010 as a response to
>>> the lack of robustness and usability of current personal
>>> authentication practices and solutions. Annual participation has
>>> doubled over the past three years. Since 2014, the conference
>>> accepts peer-reviewed papers.
>>>
>>>
>>> * IMPORTANT DATES *
>>>
>>> Research papers and short papers:
>>> - Title and abstract submission: 2016-07-04 (23:59 UTC-11)
>>> - Paper submission: 2016-07-11 (23:59 UTC-11)
>>> - Notification of acceptance: 2016-09-05
>>> - Camera-ready from authors: 2016-09-19
>>>
>>> Hacker Talks:
>>> - Talk proposal submission: 2016-09-15 (23:59 UTC-11)
>>> - Notification of acceptance: 2016-09-30
>>>
>>>
>>> * CONFERENCE AIM *
>>>
>>> More than half a billion user passwords have been compromised
>>> over the last five years, including breaches at internet
>>> companies such as Target, Adobe, Heartland, Forbes, LinkedIn,
>>> Yahoo, and LivingSocial. Yet passwords, PIN codes, and similar
>>> remain the most prevalent method of personal
>>> authentication. Clearly, we have a systemic problem.
>>>
>>> This conference gathers researchers, password crackers, and
>>> enthusiastic experts from around the globe, aiming to better
>>> understand the challenges surrounding the methods personal
>>> authentication and passwords, and how to adequately solve these
>>> problems. The Passwords conference series seek to provide a
>>> friendly environment for participants with plenty opportunity to
>>> communicate with the speakers before, during, and after their
>>> presentations.
>>>
>>> * SCOPE *
>>>
>>> We seek original contributions that present attacks, analyses,
>>> designs, applications, protocols, systems, practical experiences,
>>> and theory. Submitted papers may include, but are not limited to,
>>> the following topics, all related to passwords and
>>> authentication:
>>>
>>> - Technical challenges and issues:
>>> - Cryptanalytic attacks
>>> - Formal attack models
>>> - Cryptographic protocols
>>> - Dictionary attacks
>>> - Digital forensics
>>> - Online attacks/Rate-limiting
>>> - Side-channel attacks
>>> - Administrative challenges:
>>> - Account lifecycle management
>>> - User identification
>>> - Password resets
>>> - Cross-domain and multi-enterprise system access
>>> - Hardware token administration
>>> - Password "replacements":
>>> - 2FA and multifactor authentication
>>> - Risk-based authentication
>>> - Password managers
>>> - Costs and economy
>>> - Biometrics
>>> - Continous authentication
>>> - FIDO - U2F
>>> - Deployed systems:
>>> - Best practice reports
>>> - Incident reports/Lessons learned
>>> - Human factors:
>>> - Usability
>>> - Design & UX
>>> - Social Engineering
>>> - Memorability
>>> - Accessibility
>>> - Pattern predictability
>>> - Gestures and graphical patterns
>>> - Psychology
>>> - Statistics (languages, age, demographics...)
>>> - Ethics
>>>
>>>
>>> * INSTRUCTIONS FOR AUTHORS *
>>>
>>> Papers must be submitted as PDF using the Springer LNCS format
>>> for Latex. Abstract and title must be submitted one week ahead of
>>> the paper deadline.
>>>
>>> We seek submissions for review in the following three categories:
>>>
>>> - Research Papers
>>> - Short Papers
>>> - "Hacker Talks" (talks without academic papers attached)
>>>
>>> RESEARCH PAPERS should describe novel, previously unpublished
>>> technical contributions within the scope of the call. The papers
>>> will be subjected to double-blind peer review by the program
>>> committee. Paper length is limited to 16 pages (LNCS format)
>>> excluding references and well-marked appendices. The paper
>>> submitted for review must be anonymous, hence author names,
>>> affiliations, acknowledgements, or obvious references must be
>>> temporarily edited out for the review process. The program
>>> committee may reject non-anonymized papers without reading
>>> them. The submitted paper (in PDF format) must follow the
>>> template described by Springer at
>>> http://www.springer.de/comp/lncs/authors.html.
>>>
>>> SHORT PAPERS will also be subject to peer review, where the
>>> emphasis will be put on work in progress, hacker achievements,
>>> industrial experiences, and incidents explained, aiming at
>>> novelty and promising directions. Short paper submissions should
>>> not be more than 6 pages in standard LNCS format in total. A
>>> short paper must be labeled by the subtitle "Short
>>> Paper". Accepted short paper submissions may be included in the
>>> conference proceedings. Short papers do not need to be
>>> anonymous. The program committee may accept full research papers
>>> as short papers.
>>>
>>> HACKER TALKS are presentations without an academic paper
>>> attached. They will typically explain new methods, techniques,
>>> tools, systems, or services within the Passwords scope. Proposals
>>> for Hacker Talks can be submitted by anybody ("hackers",
>>> academics, students, enthusiasts, etc.) in any format, but
>>> typically will include a brief (2-3 paragraphs) description of
>>> the talk's content and the person presenting. They will be
>>> evaluated by a separate subcommittee led by Per Thorsheim,
>>> according to different criteria than those used for the refereed
>>> papers.
>>>
>>> At least one of the authors of each accepted paper must register
>>> and present the paper at the workshop. Papers without a full
>>> registration will be withdrawn from the proceedings and from the
>>> workshop programme.
>>>
>>> Papers that pass the peer review process and that are presented
>>> at the workshop will be included in the event proceedings,
>>> published by Springer in the Lecture Notes in Computer
>>> Science (LNCS) series.
>>>
>>> Papers must be unpublished and not being considered elsewhere for
>>> publication. Plagiarism and self-plagiarism will be treated as a
>>> serious offense. Program committee members may submit papers but
>>> program chairs may not. The time frame for each presentation
>>> will be either 30 or 45 minutes, including Q&A. Publication will
>>> be by streaming, video and web.
>>>
>>> * ORGANIZERS *
>>>
>>> - General chair: Per Thorsheim, God Praksis AS (N)
>>> - Program co-chair and host: Markus Dürmuth, Ruhr-University Bochum (DE)
>>> - Program co-chair: Frank Stajano, University of Cambridge (UK)
>>>
>>>
>>> * PROGRAM COMMITTEE *
>>>
>>> (to be announced)
>>>
>>>
>>> * STEERING COMMITTEE *
>>>
>>> - Per Thorsheim, God Praksis AS (N)
>>> - Stig F. Mjolsnes, Norwegian University of Science and Technology (N)
>>> - Frank Stajano, University of Cambridge (UK)
>>>
>>>
>>> More and updated information can be found at the conference website
>>> https://passwords2016.rub.de/
>>>
>

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.