USENIX SECURITY '04 - AUGUST 9-13, 2004 - SAN DIEGO, CA CALL FOR PAPERS The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in security of computer systems. The 13th USENIX Security Symposium will be held August 9-13, 2003 in San Diego, CA.
If you are working on any practical aspects of security or applications of cryptography, the program committee encourages you to submit a paper. Submissions are due at 23h59 (Pacific time) January 25, 2004. The symposium will span five days: Two days of tutorials will be followed by a two and one half day technical program, which will include refereed papers, invited talks, Work-in-Progress reports, panel discussions, and Birds-of-a-Feather sessions. IMPORTANT DATES Submissions Due: 25 January 2004 Notification to Authors: 31 March 2004 Camera-Ready Papers Due: 18 May 2004 ORGANIZERS Program Chair: Matt Blaze, AT&T / University of Pennsylvania Program Committee: Bill Aiello, AT&T Labs - Research Tina Bird, Stanford University Drew Dean, SRI International Carl Ellison, Microsoft Eu-Jin Goh, Stanford University Sotiris Ioannidis, University of Pennsylvania Angelos Keromytis, Columbia University Patrick McDaniel, AT&T Labs - Research Adrian Perrig, Carnegie-Mellon University Niels Provos, Google Greg Rose, Qualcomm Sean Smith, Dartmouth College Leendert van Doorn, IBM Research Paul van Oorschot, Carleton University Dave Wagner, University of California, Berkeley Rebecca Wright, Stevens Institute of Technology Invited Talks Co-Chairs: Vern Paxson, ICSI Avi Rubin, Johns Hopkins University SYMPOSIUM TOPICS Refereed paper submissions are solicited in all areas relating to systems and network security, including: * Adaptive security and system management * Analysis of malicious code * Analysis of network and security protocols * Applications of cryptographic techniques * Attacks against networks and machines * Authentication and authorization of users, systems, and applications * Automated tools for source code analysis * Denial-of-service attacks and countermeasures * File and filesystem security * Firewall technologies * Intrusion detection * Privacy preserving (and compromising) systems * Public key infrastructure * Rights management and copyright protection * Security in heterogeneous and large-scale environments * Security of agents and mobile code * Security of Internet voting systems * Techniques for developing secure systems * World Wide Web security Note that USENIX Security is primarily a systems security conference. Papers whose contributions are primarily in the area of new cryptographic algorithms or protocols, cryptanalysis, electronic commerce primitives, etc, may not be appropriate for this conference. REFEREED PAPERS & AWARDS Papers that have been formally reviewed and accepted will be presented during the symposium and published in the symposium proceedings. The proceedings will be distributed to attendees and, following the conference, will be available online to USENIX members and for purchase. One author per accepted paper is offered a $200 discount against the registration fee; USENIX will waive the fee for presenters for whom the fee would present a hardship. Awards may be given at the conference for the best overall paper and for the best paper that is primarily the work of a student. TUTORIALS, INVITED TALKS, PANELS, WIPS, AND BOFS In addition to the refereed papers and the keynote presentation, the technical program will include tutorials, invited talks, panel discussions, a Work-in-Progress session (WiPs), and Birds-of-a-Feather Sessions. You are invited to make suggestions regarding topics or speakers in any of these sessions via email to the contacts listed below or to the program chair at [EMAIL PROTECTED] Tutorials Tutorials for both technical staff and managers will provide immediately useful, practical information on topics such as local and network security precautions, what cryptography can and cannot do, security mechanisms and policies, firewalls, and monitoring systems. If you are interested in proposing a tutorial or suggesting a topic, contact the USENIX Tutorial Coordinator, Dan Klein, by email to [EMAIL PROTECTED] Invited Talks There will be several outstanding invited talks in parallel with the refereed papers. Please submit topic suggestions and talk proposals via email to [EMAIL PROTECTED] Panel Discussions The technical sessions may include topical panel discussions. Please send topic suggestions and proposals to [EMAIL PROTECTED] Work-in-Progress Reports (WiPs) The last session of the symposium will be a Works-in-Progress session. This session will consist of short presentations about work-in-progress, new results, or timely topics. Speakers should submit a one- or two-paragraph abstract to [EMAIL PROTECTED] by 18h00 on Wednesday, 11 August, 2004. Make sure to include your name, affiliation, and the title of your talk. The accepted abstracts will be posted on the symposium Web site after the symposium. The time available will be distributed among the presenters with each speaker allocated between 5 and 10 minutes. The time limit will be strictly enforced. The schedule of presentations will be posted at the symposium. Birds-of-a-Feather Sessions (BoFs) There will be Birds-of-a-Feather sessions (BoFs) Tuesday, Wednesday and Thursday evenings. Birds-of-a-Feather sessions are informal gatherings of persons interested in a particular topic. BoFs often feature a presentation or a demonstration followed by discussion, announcements, and the sharing of strategies. BoFs can be scheduled on-site, but if you wish to pre-schedule a BoF, please email the conference office, [EMAIL PROTECTED] They will need the title of the BoF with a brief description, the name, title, affiliation, and email address of the facilitator, your preference of date, and whether an overhead projector and screen is desired. PAPER SUBMISSION INSTRUCTIONS Papers should represent novel scientific contributions in computer security with direct relevance to the engineering of secure systems and networks. Submissions should be finished, complete papers. Papers should be about 8 to a maximum of 16 typeset pages (10 point type on 12 point leading). Submissions must be received by 23h59 (Pacific time) on 25 January, 2004. Submissions will only be accepted electronically via the symposium Web form, and must be in PDF format (e.g., processed by Adobe's Acrobat Distiller or equivalent). Note that LaTeX users can use the "dvipdf" command to convert a DVI file into PDF format. Please make sure your submission can be opened using Adobe Acrobat 4.0. For more details on the submission process, authors are encouraged to consult the detailed author guidelines at http://www.usenix.org. To ensure that we can read your PDF file, authors are urged to follow the NSF "Fastlane" guidelines for document preparation (http://www.fastlane.nsf.gov/a1/pdfcreat.htm), and to pay special attention to unusual fonts. A link to the web submission system will be available on the symposium web site, at http://www.usenix.org, on or about 1 January, 2004. All submissions will be judged on originality, relevance, and correctness. The USENIX Security Symposium, like most conferences and journals, requires that papers not be submitted simultaneously to another conference or publication and that submitted papers not be previously published elsewhere, or subsequently published within 12 months of acceptance at the Symposium. (We may share information about submissions with the program chairs of other conferences considering papers during the review period.) Papers accompanied by non-disclosure agreement forms will not be considered. All submissions are treated as confidential, both as a matter of policy and in accord with the U.S. Copyright Act of 1976. Authors will be notified of acceptance by 31 March, 2004. The camera-ready final paper due date is 18 May, 2004. Each accepted submission may be assigned a member of the program committee to act as its shepherd through the preparation of the final paper. The assigned member will act as a conduit for feedback from the committee to the authors. Specific questions about submissions may be sent via e-mail to the program chair at [EMAIL PROTECTED] The current version of this call for papers can be found online at http://www.crypto.com/security04cfp.html . --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]